Saturday, August 22, 2020

Tourism: An Attractive Industry For Economic Development

Theoretical The travel industry is broadly perceived as a significant impetus for financial development. As indicated by the United Nations World Tourism Organization (UNWTO), the travel industry is among the greatest ventures that make considerable commitment to the economy regarding its commitment to the GDP, the income created, expanded work and different advantages. The accomplishment of the travel industry makes one wonder what are the attributes that make it an appealing industry for financial development. So as to react to this inquiry, this investigation will investigate on the different vacation destination locales including regular and social attractions, legacy locales, national and natural life parks, amusement parks, nurseries and historical centers, sea shores and beach front districts, and diversion and occasions. This will incorporate inspecting how these attractions add to financial turn of events. UK will be utilized as the contextual analysis. Presentation The travel industry is generally perceived as a significant impetus for financial development. As indicated by the United Nations World Tourism Organization (UNWTO), the travel industry is among the greatest ventures that make significant commitments to the economy as far as its commitment to the GDP, the income created, expanded work and different advantages (Business the travel industry 2003). Take for instance the UK, the sixth biggest goal on the planet pulling in more than 32 million abroad guests yearly (Williams et al., 2010). UK’s the travel industry is the fifth biggest industry and adds to a huge extent of the GDP. In 2007, the industry was esteemed at ?114 billion speaking to 8.2% of GDP and utilizing over 2.65 million individuals (Williams et al., 2010). In 2009, the industry was esteemed at ?115.4 billion of the UK economy, thus speaking to 8.9% of UK GDP (Williams et al., 2010). The travel industry is additionally foreseen to develop yearly at 2.6%, a development rate like that of retail and development enterprises (Williams et al., 2010). Undoubtedly, the travel industry progressively keeps on turning into an alluring industry for financial development with an expanding number of guests. This makes one wonder what are the attributes that make the travel industry an appealing industry for monetary developmentThis examination is in this way proposed on investigating on these qualities with an attention on the elements that lead to financial turn of events. Prior to giving an outline of the basic parts of the financial aspects of the travel industry, we will initially characterize what we comprehend by the term â€Å"tourism† WHAT IS TOURISM? The term â€Å"tourism† was first characterized by Hunziker and Krapf (1942), the fundamental pioneers of the travel industry look into. They characterized the travel industry as a total of relations and marvels that came about because of voyaging and remaining of non-inhabitants. In this specific situation, a stay doesn't result into changeless habitation of the individual and isn't in any capacity associated with lasting or transitory winning action. This calculated definition was for an extensive time commonly acknowledged yet had certain imperfections. For instance, a visit to the clinic could be considered as a type of the travel industry. Moreover, under this theoretical definition, non-inhabitants were just related to outsiders; thus local the travel industry had no spot in it. In the later years, an increasingly compact meaning of the travel industry was advanced by the British Tourism Society. In view of crafted by Burkart and Medlik (1974), the British Tourism Society received the accompanying definition. The travel industry is regarded to be comprehensive of any action worried about transient development of individuals to goals other than their neither fundamental persistent homes nor work environment (Burkart and Medlik 1974. Inside this applied definition, exercises including a remain or a visit to the goal are incorporated. It additionally takes into account household and day visits too. This definition despite everything applies state-of-the-art. Another calculated definition that merits extraordinary consideration is that advanced by Gilbert (1990). Gilbert (1990) places that travel industry is a piece of entertainment that includes heading out to different goals for a transient period with the point of fulfilling a purchaser need. This definition places the travel industry in the general setting of amusement. Diversion as per Cooper et al. (1993) alludes to the interests occupied with during relaxation time. In any case, it ought to be noticed that travel industry isn't just limited to exercises completed during recreation time. Some portion of the travel industry (business the travel industry specifically) happens during working time including shows and conferences. Visitor SECTORS The travel industry involve five fundamental parts: THE ATTRACTION SECTOR: †this area contain the normal and social attractions, legacy locales, national and untamed life parks, amusement parks, nurseries and exhibition halls, sea shores and waterfront districts, and diversion and occasions (Anon 2004). THE ACCOMMODATION SECTOR: †this segment contain the inns, inns, condos, manors and pads, visitor houses, occasion towns, campgrounds, marinas, visiting troops and townhouse timeshares (Anon 2004). THE TRANSPORT SECTOR: †Consists of the aircrafts, railroads, delivering lines, vehicle rental administrators, and transport and mentor administrators (Anon 2004). THE TRAVEL ORGANIZER SECTOR: †the part covers visit administrators, trip specialists and motivation travel coordinators among others (Anon 2004). THE DESTINATION ORGANIZATION SECTOR: †this incorporates local and national traveler workplaces, neighborhood vacationer officials and the travel industry affiliations (Anon 2004). So as to address the inquiry: what are the qualities that make the travel industry an alluring industry for financial turn of events, we will investigate on the fascination destinations talked about above. This will likewise incorporate investigating on business the travel industry and its commitment to monetary turn of events. Social AND HERITAGE ATTRACTIONS Social and legacy attractions assume a huge job in the travel industry. The majority of the world legacy destinations have a social centrality that rise above national limits and of significance to the present and people in the future. As of now, there are 890 world legacy locales mirroring a rich decent variety of the world’s social legacy (Endresen 1999). In the United Kingdom, locales as differing, for example, the Giant’s Causeway, City of Edinburgh, Blaenavon Industrial scene, and Manchester City help make up the UK’s legacy (UNESCO 2009). In this unique circumstance, Manchester city, one of the most lively cosmopolitan urban areas has a flourishing craftsmanship and social scene that draws in an enormous number of guests. The city’s fascination focuses incorporate the games arenas, historical centers and exhibitions, and music settings (UNESCO 2009). The rich social legacy, energetic expressions scene and the multicultural populace in UK makes it an exceptionally appealing visitor goal. Galleries which exhibit the best of Britain’s culture and history pull in a large number of universal and local guests. Britain’s culture and legacy is evaluated to drawing in ?4.5 billion worth of spending by inbound guests yearly (UNESCO 2009). Regular LANDSCAPE SITES Another famous alluring site in the travel industry is the characteristic scene. Common scenes, for example, Stonehenge, the most popular and strange milestone in the UK, draws in countless vacationers (Mieczkowski, 1990). Worked more than 650 years prior and comprising of a ring of solid stones, the milestone is a mainstream appealing site. Beautiful scenes, for example, the Wye Valley, a universally ensured scene riding the outskirt among Wales and England likewise pulls in countless guests (Mieczkowski, 1990). This region that spreads portions of Hertfordshire, Gloucestershire and Monmouthshire is generally perceived for its flawless view and thick local forests just as for its untamed life and archeological remains (Mieczkowski, 1990). NATIONAL AND WILDLIFE PARKS National stops additionally assume an immense job in the travel industry. Britain’s best national and untamed life parks, zoos and creature attractions, for example, the Animalarium draw in an enormous number of guests (Mathieson and Wall 1982). The national parks offer an assortment of exercises extending from strolling, investigating on the rich and social legacy to seeking after different exercises, for example, cycling, rock climbing, and absailing among others (Mathieson and Wall 1982). An expected 110 million individuals are evaluated to visit national stops in England and Wales yearly (UNESCO 2009). Diversion AND EVENTS Diversion and occasions additionally assume a significant job in the travel industry. Lion's share of the shows and performances occurring in the UK draw in more than 7.7 million guests, local and abroad joined (ICTHR 2010). The critical measure of income created from amusement and occasions is utilized in boosting the UK’s economy. An extraordinary larger part of these voyagers are UK occupants who travel outside of their districts to go to occasions and see their preferred craftsmen perform live in another area inside the UK (ICTHR 2010). London commands as the goal for unrecorded music the travel industry in the UK. Music vacationers at the capital dwarf the nearby music fans. Its predominance can be ascribed to the high number of household music sightseers going to shows. With a populace of in excess of 7 million individuals, the locale is host to the O2 Arena, the best show setting on the planet (ICTHR 2010). London area is additionally a host to Wembley arena and Royal Albert Hall too (ICTHR 2010). Its parks, for the most part Victoria Park, Hyde Park and Clapham are home to a developing number of performances (ICTHR 2010). Sea shores AND COASTAL AREAS Sea shores and beach front regions are additionally a colossal fascination site for travelers. The travel industry in the south of Wales, for instance, is fundamentally centered around the beach front territories so as to draw in its guests. The Welsh traveler industry which is worth ?3.5billion and makes a noteworthy commitment to Wales’ GDP depends to a great extent on I

Wednesday, July 15, 2020

Definitive Gift Books Guide For Holiday Season

Definitive Gift Books Guide For Holiday Season The best guide to gift books, divided by special needs. There truly is something for everyone here. Cosy Christmas Reads   Seven Days of Us by Francesca Hornak This heartwarming but satisfyingly complex family saga is perfect for Christmas. It doesnt hurt that the hardback is simply gorgeous, with festive end papers. The Birch family is forced to spend a Christmas together after Olivia returns after treating an epidemic abroad and has to stay in quarantine, along with her family. Simmering tensions boil over and every family members secrets spill out as Francesca explores the mixed emotions in the lead up to Christmas. This hilarious story has a tender core and if you are a fan of Love Actually,  then youll love this quintessentially British holiday read. Classic Ghost Stories: Spooky Tales to Read at Christmas (Vintage Classics) If, like me, you also think that spooky tales are the best to cuddle up with on cold nights then you need to get this chunky book. This collection comprises spine-chilling tales by the masters of 19th century literature who helped define the horror genre.  Collected here are some of the most iconic of these Victorian ghost stories, from Charles Dickenss The Signalman to M.R. Jamess A Warning to the Curious. It also includes influential horror stories by Rudyard Kipling,  Elizabeth Gaskell, Edith Wharton,H G Wells, among others. This is the ultimate gift for anyone who enjoys literature and horror. Sleep No More: Six Murderous Tales by P.D. James What could be better in December than cosying up to a  previously uncollected selection of deliciously wicked mysteries from the Queen of Crime. All the six vengeful stories feature a murder but weaves together cleverly crafted plots with pitch perfect execution and great psychological insight about each characters motives. Fiendishly cunning and compulsively readable, this book has a wintry theme and is slim enough to read in a night or two. Snazzy Gift Books Letters to the Lady Upstairs by Marcel Proust, Translated by Lydia Davis This pretty little hardback makes for a glamorous gift for book snobs. Proust was a prolific letter writer and this book compiles 23 letters he wrote to a harpist, Madame Williams, who lived with her husband in one of the apartments above  Prousts at 102  Boulevard Hausmann in Paris. Translated expertly by acclaimed writer Lydia Davis, these letters give fascinating insight into an unusual friendship. Its a delightful book which reveals intimate details about Prousts life while also portraying a charming portrait of friendship, noisy neighbours and Parisian life. An attractive stocking filler, this one! The Lost Words by Robert MacFarlane and Jackie Morris No wonder this has been hailed as one of the years most beautiful books. The Lost Words  is utterly mesmerizing inside and out. All over the country, there are words disappearing from childrens lives. These are the words of the natural worldâ€"Dandelion, Otter, Bramble and Acorn, all gone. The rich landscape of wild imagination and wild play is rapidly fading from our childrens minds.  With the help of exquisite illustrations by Jackie Morris, Macfarlane methodically restores the missing words in Childrens lexicon with spell-poems. This breathtaking book will reignite the love of language in people of all ages. Brolliology by Marion Rankine This pretty little gem of a book is not only pleasing to look at but also packs in a lot of information.    In the spirit of the best literary gift books,  Brolliology  is a beautifully designed and illustrated tour through literature and history of umbrellas, which have been use by humans for a millennia. This enjoyably umbrella tour through the history of this forgettable everyday object in cinema, books and our daily life. Filled with cool illustrations and fun facts, this lovely book is a surprisingly compelling book on an unusual subject. Murder on the Orient Express by Agatha Christie (Illustrated Edition) This timeless masterpiece of detective fiction was adapted this year for the big screen with a star studded cast. This large format illustrated edition of Agatha Christies novel features stunning artwork and photography from the 2017 film adaptation. The illustrated edition contains the complete text of Agatha Christies Murder on the Orient Express, together with 200 glorious production paintings and sumptuous photos from the new film, directed by Kenneth Branagh. A must-have coffee table book for this year! Stories by Susan Sontag Trust me when I tell you that if you are a bibliophile, you need this beautiful hardback in your life. Susan Sontag  was an intellectual, film maker, and writer best known for her essays on modern culture. Stories  collects all of Sontags short fiction for the first time. These superb stories show the sheer versatility of one of this centurys most inquisitive minds.  The stories ranges from allegory to parable to autobiography and shows her wrestling with problems about existence and humanity. The stories in this book provoke, questions and inspire in a way that only great writing can. Evocative and fascinating, these stories dwell on the human condition in unique and original ways. Delectable Cookbooks The Christmas Chronicles by Nigel Slater This hefty volume is simply stunning inside and out. Featuring a lavish design and equally beautiful pictures inside, this is a hymn to winter and Christmas.  With recipes, decorations, fables and quick fireside suppers, Nigel guides you through the essential preparations for Christmas and the New Year, with everything you need to enjoy the winter months. Featuring over 100 recipes supplemented by personal anecdotes, suggestions and useful tips, this book will be loved by foodies as much as by readers. Besides tempting descriptions of food, Slater writes about the first frost of winter and the excitement of Christmas with infectious joy and charm. Nadiyas British Food Adventure by Nadiya Hussain   Cant get enough of Bake Off? Then this book, from everyones favourite Bake Off  winner Nadiya Hussain, is a must for you. From  Cayenne eggs Benedict to soft poached eggs on an English muffin with smoked turkey rashers and cayenne hollandaise sauce, this book is your guide to classic British winter dishes. Containing over 120 mouth-watering recipes with fabulous pictures, this cookbook reads like a novel. Nadiya combines eclectic flavors from her native Bangladesh to the West Indies, Mediterranean, and Yorkshire to whip up scrumptious dishes. Sabor: Flavours from a Spanish Kitchen by Nieves Barragan Mohacho This book comes from the renowned Spanish chef who has a Michelin star and is  is best known as the former head chef at Barrafina, the world famous tapas restaurant. This compilation of classing Spanish recipes range from hearty dishes like chorizo and potato stew to lighter fare such as seafood skewers and clams in salsa verde.  A very personal cookbook from a very particular cook, Sabor is full of delicious flavours and delightful recipes youll return to time and again. Dickensian Christmas Charles Dickens Vintage Classics Christmas is incomplete without the mention of Dickens and these six beautifully tailored editions of Dickens’s most beloved books are must-haves for every bookshelf.  The first 4,000 copies have black-sprayed edges which gives them the perfect Dickensian feel. The books in this collection includes  A Christmas Carol (includes the short stories The Chimes and The Haunted Man), David Copperfield, Great Expectations,  Hard Times,  Oliver Twist and A Tale of Two Cities. If you are looking for fancy books to gift, these lavishly designed paperbacks with customised end papers are perfect. Mr. Dickens and His Carol by Samantha Silva A story about Dickens set during Christmas. Now what could be a better Christmas gift? This charming novel reimagines the events that led to the creation of A Christmas Carol. Dickens latest book has been a flop, his family is ever-expanding, and relatives near and far hound him for money. His publishers offer him a chance to turn his luck around by writing a Christmas book in just 4 weeksâ€"or face financial ruin.  Charles sinks into a depression as  a serious bout of writer’s block sets in. He takes to wandering the majestic city of London to seek inspiration. The story combines vivid descriptions about the glittering 19th century London with a rich and poignant story about redemption and family. This book is atmospheric, touching and infused with holiday spirit like the best Dickens. Priceless Book Bundles Paul Beatty Reissues The Sellout  was hands down the best novel I have read in recent years so I was very excited when Pauls publishers Oneworld announced a reissue of all his novels featuring fantastic covers. The novels here include The White Boy Shuffle, Tuff, Slumberland and the Man Booker winning The Sellout. No one writes with such lacerating wit about Americas post-racial delusion and the black American experience as Paul. So if you havent read him yet, now is your chance. Truman Capote Modern Classics Fan of literary classics? Then these Capote reissues are for you. Nine of Capote’s works are published in Penguin Modern Classics including most recently, a newly discovered collection,  The Early Stories.  All the new editions feature iconic photographs by   Richard Avedon, with whom Capote worked  closely on  In Cold Blood.  The new volumes feature additional stories and quietly elegant covers. These classics are a must for every bibliophiles collection. P.G. Wodehouse Reissues Wodehouse is often acknowledged as the best English comic novelist of the century, so this bundle is guaranteed to make you howl with laughter. Comprising largely of  the best Jeeves and Wooster stories, each volume in this series feature three entertaining stories. So you have a medley of Wodehouse delights in which lunacy and comic exuberance reign supreme. Sign up to The Goods to  receive emails about new products and promotions in the Book Riot Store. Thank you for signing up! Keep an eye on your inbox.

Thursday, May 21, 2020

The Battle Of The Civil War - 771 Words

Authors: Teni Adebayo- Blue Michael Mikhaiel-Red There were many major events that occurred in the state of Texas, but none of them were as disastrous as the ones that happened in the Civil War. The Civil War was the war with the most American deaths. Many battles happened in Texas, but in the Civil War there were many significant battles that took place in Texas. The first battle of the Civil war that was fought on Texas soil was the Battle of Sabine Pass. This battle was another attempt by the Union to get part of Texas from the Confederacy. The reason why the Union was trying to take part of Texas ,and the states southern of the Mississippi river back to the union, was because of the cotton they produced.†¦show more content†¦Another victory for the Confederacy. On July 1861 the Union Navy began another blockade at Galveston Harbor. The union sent Harriet Lane flying a flag of truce. This meant if they did not surrender they would attack them. Four of the Union s steamers entered and went straight to where Harriet Lane was. The Confederates saw this and started shooting at the Union. The U.S. Navy answered back with guns. Finally the Union disabled one of the confederate s guns at Fort Point, then went for the other two. Two Rebel guns started firing on Union ships. The boat that Col. Cook had sent now approached the Union ships and two of the Confederate officers boarded the U.S.S Westfield. Renshaw demanded a surrender of Galveston or he would start shelling. Col. Cook refused Renshaw s terms, and Renshaw threatened to start shelling and made plans for towing the mortar boat into position. One of the major Confederate officers wanted to talk to col. Cook, because Commander Renshaw and him made a truce that will last for four days to make sure all the women, children, and Aliens out of the city. Cook allowed this but added if Renshaw moved his troop any closer that Cook would let his troops go south. Since this truce wasn t written down it caused problems later. The Confederates did indeed evacuate, taking everything they had including their weapons, ammunition, supplies and whatever else they could carry. Renshaw did not think that

Wednesday, May 6, 2020

Critical analysis of a qualitative study - 1240 Words

Critical Analysis Grand Canyon University NRS-433v 7/30/15 Critical Analysis Problem Statement In â€Å"Bundles to Prevent Ventilator-Associated Pneumonia: How valuable are they?,† Charity Wip and Lena Napolitano present the results of a qualitative study to determine the value of different care bundles in preventing the occurrence of ventilator-associated pneumonia (VAP). In fact, the authors concede that VAP is often resultant of the ventilator care plan, and that the ventilator bundle would be critical in reducing the occurrence of VAPs among the intensive care unit (ICU) patients. Of important is the fact that a range of care bundles are present, each differing in its specific care process that focuses on VAP prevention and†¦show more content†¦An examination of the literature sources publication dates shows that six had been published in 1999 or earlier while the remaining 34 had been published in the following years. The relevance of the studies (considering that six were not current) was difficult to assess, although the fact that the study was of a qual itative nature shifts focus from their quantitative results and into their authoritative perceptions. Still, the use of quantitative findings from these publications could call into question their accuracy and how current they are since time is a factor that influences quantitative results. The fact that the authors did not indicate the weaknesses and strengths of the articles that were used is a negative against the research since readers are left to question the authentic nature of the studies and the authors objectively. This is because that authors could have only included what they deemed to support their opinions without regards to the research process thereby causing both Type I and Type II errors. Despite the shortcomings identified with regards to the literature review, it must be accepted that it included adequate information to allow readers to build a logical conclusion that matched that of the authors. This is particular true when it is considered that quantitative evid ence was presented as evidence to support the differentShow MoreRelatedAnalysis on Two Leadership Articles1262 Words   |  5 Pagesdiscussion, select two articles related to your final project literature review. Categorize the articles as to whether they use a qualitative or quantitative methodology. If possible, select one article that uses each method. In your initial post, provide a citation and a brief summary of the methodology used to study leadership in the articles. Provide your critical analysis of the articles and methodology and assess the contributions of each particular research methodology to understanding your leadershipRead MoreQualitative Research Study And Action Research Essay1250 Words   |  5 PagesIntroduction Qualitative research plays an important role in evidenced-based practice. Qualitative research often lay down the platform for added official quantitative studies or a follow up to a broad quantitative study. Qualitative research is a subjective design that investigates exceptional life concepts in a naturalistic setting using narrative descriptions as the findings (Polit Beck, 2017). There are six general types of qualitative research designs, namely phenomenological, ethnographicRead MoreBlack Masculinity Through The Media923 Words   |  4 Pagesmedia becomes a social understand. Qualitative research develops a deeper understanding on the lived experience of the individual. Qualitative research relays on the experience and the researcher’s interpretation of the experience to created universal understand of a social issue. Qualitative method interpreted the visual experience which requires the researcher to join the experience and interpreted the phenomena in a meaningf ul way. (csulb.edu) Qualitative method has several theoretical underpinningsRead MoreQualitative Research Study And Action Research Essay1239 Words   |  5 Pages Qualitative research plays an important role in evidenced base practice. Qualitative research often lay down the platform for added official quantitative studies or a follow up to a broad quantitative study. Qualitative research is a subjective design that investigate exceptional life concepts in a naturalistic setting using narrative descriptions as the findings (Polit Beck, 2017). There are six general types of qualitative research designs namely phenomenological, ethnographic, historical,Read MoreUse of Qualitative and Quantitative Research979 Words   |  4 Pagesquestion. Research, in its most basic form is the process of answering that question, or questions. Academic research, though, is a systematic process of collecting and analyzing information so that it increases the understanding of the phenomenon under study (Holton Burnett, 2005). Regardless of the complexity or nature of the research project, there are at least eight characteristics that help define the process: 1) Research originates with a question or a problem; 2) Research requires a clear articulationRead MoreApplying A Mixed Methods For Choosing Text And Data Collection932 Words   |  4 PagesMethodology 3. 1 Introduction In this chapter, I introduce and then give a detailed account of the research methodol-ogy adopted in the present study. The chapter has two sections, in the first of which I pro-vide a brief account of the main implications of applying a mixed-methods approach in re-search design and a brief description of the different ways of designing mixed-methods re-search in 3.2. In the second section, I discuss the use of corpus linguistics as a research method, that is, theRead MoreQualitative Research : Quantitative Research1442 Words   |  6 Pageslevel, qualitative research involves an interpretive, naturalistic approach to the world. This means that qualitative researchers study things in their natural settings, attempting to make sense of, or interpret, phenomena in terms of the meanings people bring to them. (Denzin Lincoln, 2005, p. 3) Different from quantitative research that collects and analyzes numerical data, qualitative research deals with non-numerical data such as interviews, participant observations, audio and visual imagesRead MoreQualitative Research Critique: Asthma Self-Management in Puerto Rican Families935 Words   |  4 PagesQualitative Research Critique: Asthma Self-Management in Puerto Rican Families In the research study, A qualitative exploration of asthma self-management beliefs and practices in Puerto Rican families, Martin et. al. (2010) explored the nature and dynamics of asthma management within Puerto Rican families. The rationale for this specific focus on Puerto Rican families is cited within the study, wherein a 2002 survey determined that Puerto Rican children suffered the most from asthma comparedRead MoreFactors, Contributions And Challenges Of Gender Leadership And Leadership924 Words   |  4 Pages2017). As the intent of the study is to explore leaders’ perspectives, motivations and attitudes toward gender leadership and related topics, purposive sampling is acceptable; as the study seeks to understand and explore issues affecting a specific population, rather than simply focusing on the generalizability of the study (Setia, 2016). Materials/Instruments A digital voice recorder will be used for the individual semi- formal interviews. Also, NVivo qualitative software will be employed, asRead MoreHealth Promotion Model : A Meta Synthesis1303 Words   |  6 Pages Critical Analysis of a Published Research Article Ho, A.Y.K., Berggren, I., Dahlborg-Lyckhage, E. (2010). Diabetes empowerment related to Pender’s Health Promotion Model: A meta-synthesis. Nursing and Health Sciences (2010), 12, 259–267 Title Evaluation The title of this article â€Å"Diabetes empowerment related to Pender’s Health Promotion Model: A meta-synthesis† has been to-the-point and has been definite. The title has hinted at the way the research would be conducted without

Features of a moral panic AS sociology Free Essays

One feature of a moral panic Is stigmatisation. This means that Individuals Involved in that particular moral panic are labelled. For example, Mods and Rockers didnt often fight however, after a small conflict at a seaside location many people believed that the mods and the rockers were in a consistent conflict and In turn many media sources began using words such as â€Å"antisocial† and â€Å"violent† in relation to any youth belonging to this particular subculture. We will write a custom essay sample on Features of a moral panic AS sociology or any similar topic only for you Order Now https://donemyessay.com/sociology-exam-3-chapters-6-8/ Labelling these groups as the cause of the roblem (the fghts) can therefore lead to self-fulfilling prophecy which causes more Mods and Rockers to believe that they should (and are expected to) act in a violent way towards each other, this makes the problem significantly more apparent In society. Another feature of a moral panic is the media amplification of a problem. For example, after Acid House gained a reputation for hosting large parties that were ‘ecstasy fuelled’. Many media sources exaggerated the extent to which there was a discrepancy of morality. After a death related to the use of ecstasy many newspapers began to publish news which was anti-acid house despite the fact that the death was not actually related to an overdose of the drug but instead the extent to which the girl had drunk water during the party she had been at. This therefore shows that the media use a small issue in order to sell papers; they exaggerate the primary issue and even -allegedly- during the Mods and Rockers fights, even encouraged the violent behaviour that had rarely been seen beforehand. ton How to cite Features of a moral panic AS sociology, Papers

Friday, April 24, 2020

RFID-Technology Improving the Batangas State University-JPLPC Campus Library Security Essay Example

RFID-Technology: Improving the Batangas State University-JPLPC Campus Library Security Essay CHAPTER 1 THE PROBLEM AND ITS BACKGROUND Introduction The changing needs of people led to the development of a means to make tasks a lot easier and more convenient. This is technology. It is a tool that now plays an important role in peoples everyday life. Because of this technology every complicated task is now provided with an equal solution. Hence, the difficulties that people experience in doing tasks are minimized. It is not impossible that in the near future, these difficulties will be eliminated. When this happens, industrial evolution will surely take place. An example of a technology that sparks the interest of people in the library community nowadays is the Radio Frequency Identification (REID). This is due to its applications that promise to increase efficiency, productivity and enhance user satisfaction. Apparently, globally emerging knowledge-based societies of the twenty first century will need information to sustain their growth and prosperity so with intellectual capital as investments, knowledge and information have become their wealth generators. In this scenario, people cannot deny the importance of libraries which are repositories of reference resources. In most modern academic libraries where millions of books, periodicals, CDs, DVDs and other electronic reading materials are contained, it is a challenge for librarians to manage such type of huge collection. This is the reason why RFID is one of the most adopted technologies both by the academes and the industries. At present, there are several higher education institutions in the Philippines that are already using the RFID technology in their libraries. Some of these institutions are De La Salle University, University of Sto. Tomas, First Asia Institute of Technology and Humanities and Batangas State We will write a custom essay sample on RFID-Technology: Improving the Batangas State University-JPLPC Campus Library Security specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on RFID-Technology: Improving the Batangas State University-JPLPC Campus Library Security specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on RFID-Technology: Improving the Batangas State University-JPLPC Campus Library Security specifically for you FOR ONLY $16.38 $13.9/page Hire Writer University Alangilan Campus. These universities are already experiencing the convenience in library management brought about by this RFID technology. After seeing how the system has helped the abovementioned institutions, the researchers thought of providing this technology to their alma mater. Batangas State University-JPLPC Campus still uses the traditional method for the inventory of library materials and equipment. The proponents believe that with the use of RFID technology, it will be more convenient for the library staff to deny possible theft or misuse of library belongings. Also, the development of the RFID reader will be essential to enhance the security of the campus library and will lessen the effort needed by the library staff in managing library resources. Objectives of the Study The main objective of the study was to design and develop an RFID Reader for the Library Security of Batangas State University -JPLPC Campus. Specifically, this study aimed to: conslaer tne current state 0T tne Batangas state Unlversl c campus LIDrary ana make an innovation through development of library security feature. . Design a circuitry reader for library security. 3. Develop a Graphical User Interface (GU) using Visual Basic. NET that will integrate RFID Reader, RFID tags, and Anti-Theft Detector. 4. Make the inventory of library properties easier, faster and systematic. Significance of the Study The RFID reader which was developed for Batangas State University-JPLPC Campus is believed to benefit the University Library personnel, College of Engineering and Computing Sciences, library users, other schools and libraries and future researchers. To the library personnel, the project would be essential in the safekeeping and maintaining of books and other materials in the library. Also, it would help them save time and effort in making inventories regarding library materials. To the College of Engineering and Computing Sciences, this project would serve as another accomplishment. Likewise, it would be a helpful tool which could contribute in the betterment of learning since the prototype can be used to aid instruction. To the library users, the project could provide a faster and an easier means for searching and accessing the materials they need. The time they usually spend in finding references would be minimized. Effectiveness in time usage would hen be improved thus; it would lead to increased productivity. To other schools and libraries, the project could serve as a motivating factor for them to uplift the power of Information Technology in providing better services to their students. They may develop similar tools or invent new systems. Finally, to future researchers, the project could aid them in the conduct of similar studies because this could serve as a valuable reference. Scope and Limitations of the Study The current study requires knowledge about the RFID technology, software programming, and other factors governing the study, and mainly focuses on the esign and development of an RFID reader for the library security of Batangas State University-JPLPC Campus. It has four components: RFID reader, RFID tags, anti-theft detector and application software. The RFID reader is an MCU-based prototype it could read RFID tags that holds data which are transmitted to the reader when it is interrogated by the reader. The anti-theft detector identifying items that has tags and the buzzer will beep. The application software serves as communication gateway among the various components that include Application Programming Interfaces hich are necessary for the integrated library software. Besides the features rest the limitations of the project developed. First, it does not include extra security features like security cameras and other similar devices which could be helpful in identifying cases wherein tags will be removed intentionally. Despite the capacity, this reader has its own limitation. It can read tags within three inches only. Also, it does not include the monitoring of borrowed books which are already overdue. REVIEW OF RELATED LITERATURE This chapter presents the related studies that the proponents gathered to support he outcomes of their project. It provides readers with a good grasp of different types of Automatic Identification Data Capture Technology, focusing specifically on RFIDs key components as well as its applications. Conceptual Literature This includes the concepts, principles and ideas by which the research study was built. The ideas included in this part served as basis and foundation of the researchers in conducting the study. RFID Tags An RFID tag is also known as a transponder (derived from the terms transmitter and responder) which holds the data that is transmitted to the reader when the tag s interrogated by the reader. The most common tags today consist of an Integrated Circuit (C) with memory, essentially a microprocessor chip. Other tags have no chip and onboard Integrated Circuit. Tags without chips are more effective in applications where simpler range of functions is all that is required; although, they can help achieve more accuracy and better detection range, at potentially lower cost than their Integrated Circuit-based counterparts . Tags contain microchips that store the unique identification (ID) of each object. The ID is a serial number stored in the RFID memory. The chip is made up of integrated circuit which is embedded in a silicon chip. RFID memory chip can be permanent or changeable depending on the read/ write characteristics. The read-only circuits are different from rewrite circuits. Read- only tags contain fixed data and cannot be changed without re-programming them electronically. On the other hand, re-write tags can be programmed through the reader at any time without any limit. RFID tags can be made of different sizes and shapes depending on the application and the environment at which they will be used. A variety of materials are integrated on these tags. RFID tags can also be classified by their capabilities such as read and write data. The essential characteristics of RFID tags are their function to the RFID system. This function is based on their range, frequency, memory, security, type of data and other characteristics. Likewise, these are the core of RFID performance. The range of the RFID tags depends on their frequency. This frequency determines the resistance to InterTerence ana otner perTormance attrlDutes . I ne use/selectlon o T RFID tag depends on its application. Furthermore, different frequencies are used on different RFID tags (Ahsan, et al. 2010). RFID Reader The RFID reader works as a central place for the RFID system. It reads tags data through the RFID antennas at a certain frequency. Basically, the reader is an electronic apparatus which produce and accept radio signals. The antennas contain an attached reader. This reader translates the tags radio signals through the antenna depending on the tags capacity. The readers consist of a built-in anti- collision scheme. A single reader can operate on multiple frequencies. As a result, these readers are expected to collect or write data onto tag (in case) and pass through computer systems . The RFID reader sends a pulse of radio energy to the tag and listens for the tags response. The tag detects this energy and sends back a response that contains the tags serial number and possibly other information as well. In simple RFID systems, the readers pulse of energy functions as an on-off switch. In more sophisticated systems, the readers RF signal can contain commands to the tag, instructions to read or write, memory that the tag contains, and even passwords. Historically, RFID readers were designed to read only a particular kind of tag. At present, the so-called multimode readers that can read many different kinds of tags re becoming increasingly popular. RFID readers continuously transmit radio energy and wait for any tags that enter their field of operation. However, for some applications, this is unnecessary. Moreover, it could be undesirable to battery-powered devices that need to conserve energy. Thus, it is possible to confgure an RFID reader so that it can send radio pulse in response to an external event. For example, most electronic toll collection systems have the reader constantly powered up so that every passing car will be recorded. On the other hand, RFID scanners used in veterinarians offices are frequently quipped with triggers and are powered up only when the trigger is pulled. Like the tags themselves, RFID readers come in many sizes. The largest readers might consist of a desktop personal computer with a special card and multiple antennas connected to the card through a shielded cable. Such a reader should have a network connection in order to report the tags that it reads from other computers. Conversely, the smallest readers are the size of a postage stamp and are designed to be embedded in mobile telephones. Nowadays a lot of RFID readers are sold with multiple brands such as Mifare, Hitachi, and Phillips. Because of the major application it has worldwide, many systems require the simultaneous use of more than one operating frequency. Most systems available on the world market at present operate at one of the following frequencies or frequency ranges: below 135 kHz (125 kHz, 134. 2kHZ for example), 13. 56MHZ, UHF (860/960 MHZ), 2. 45GHZ and 5. 8GHz. The operating and controlling characteristics are different for each of these frequencies; therefore, each of them is more appropriate for certain types of application or certain countries than others . RFID Anti-theft Detector The RFID anti-theft detector is the part of the library security system which uses the same RFID tags embedded in the library items. Each lane is able to track items of about 1 meter and triggers the alarm system when an item which has not been Dorrowea passed tnrougn tnem. I ne alarm wlll sound ana tne llgnts on tne gate will flash as a patron passes through carrying any library material which was not borrowed. The anti-theft detector which is interfaced with the reader and the software is used to detect RFID tags. It can detect RFID tags within one meter range without interference of the magnetic items. Upon the detection of RFID tags, the alarm will sound on the door and will record the result to show whether the detected tag is available or not. Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology which operates independently of the library database. In order to determine the values for the inductance and the capacitance needed, the following equation which is shown below was used: Frequency Formula F stands for the resonant frequency (in Hertz), L for inductance (in Henries) and C for capacitance (in Farads). Since f = 125 KHz and the ceramic capacitors have 1 nF value, hen the settled inductance value isl . 62 mH. Antenna The idea of RFID was first developed in 1948. Recently, there have been many enhancements to this basic idea. Likewise, the concept has found applications in many areas. One suggestion is the replacement of the universal price code (UPC) barcode system. Practical considerations have driven a need for smaller tags with longer reading range. The reading range can be defined as the maximum distance at which an RFID reader can detect the backscattered signal from the tag. This vital factor can be increased by designing antennas with higher gain which is directly elated to the antenna efficiency. Design engineers seek the smallest, most efficient antenna structures for their RFID tags. As mentioned above, one of the key features of RFID tag is antenna design. Traditionally, design engineers predict the performance of the antenna based on electromagnetic calculations which approximate real antenna performance. More recently, computers and accurate numerical modeling software applications have become available to explore antenna performance before construction. The antenna is the most crucial element for an RFID tag because it is the power ource which is essential in achieving a large transceiver range. Other essential properties for an RFID antenna are size, robustness and manufacturing costs. The reading range is directly proportional to the wavelength used. Lower frequencies or longer wavelengths tend to increase the reading range. When it increases, larger antennas are needed. The design goals for an RFID antenna is to make it small, efficient and with long reading distance (Lewis, et al. , 2009). The standard formula for the rectangular coil is determined by the following equation: Formula for the Coil Needed (Ross, et al. , 2012) L in the equation is in microHenries. The x and y variables are for the width/length of the coil (in cm); h is the height of the coil (in cm); b is the width across the conducting part of the coil (in cm); and N is the number of turns. In this project, the following values were used: x=3. 6cm; F 3. 8 m; h=l cm; and b=. 3 cm (estimated). PIC Microcontroller PIC microcontrollers are a family of specialized microcontroller chips produced by Microchip Technology in Chandler, Arizona. The acronym PIC stands for peripheral interface controller, although this term is rarely used nowadays. A microcontroller is compact microcomputer designed to govern the operation of embedded systems in motor vehicles, robots, office machines, medical devices, mobile radios, vending machines, home appliances and other devices. A typical microcontroller includes a processor, memory, and peripherals. The PIC microcontrollers appeal to hobbyists and experimenters, especially in the fields of electronics and robotics. Their key features include wide availability, low cost, ease of reprogramming with built-in EEPROM (electrically erasable programmable read-only memory), an extensive collection of free application notes, abundant development tools and a great deal of nformation available on the Internet. Every PIC microcontroller has a set of registers that also functions as a RAM (random access memory). Special purpose control registers for on-chip hardware resources are also mapped into the data space. Every PIC has a stack that saves return addresses. The stack was not software-accessible on the earlier versions of the PIC, but this limitation was removed in later devices . Buzzer A buzzer is an electric signaling device, such as a doorbell, that makes a buzzing sound. It may be mechanical, electromechanical, or piezoelectric. Typical uses of uzzers and beepers include alarm devices, timers and confirmation of user input through a mouse click or keystroke . Automatic Identification and Data Capture Automatic identification and data capture (AIDC) refers to the methods of automatically identifying objects, collecting data about them, and entering that data directly into computer systems (i. . without human involvement). Technologies typically considered as part of AIDC include bar codes, Radio Frequency Identification (REID), biometrics, magnetic stripes, Optical Character Recognition (OCR), smart cards, and voice recognition. Related Studies To further extend their knowledge regarding RFID technology, the proponents went through a rigorous review of previous studies which are related to their project. A discussion of these studies is provided in the succeeding paragraphs. Radio Frequency Identification (RFID) technology is now frequently used because of its capability to provide security. The significant advantage of all types of systems which are based on this technology is their non-contact and covert nature. In fact, tags can be read through a variety of substances such as snow, fog, ice, paint, crusted grime nd other visually and environmentally challenging conditions where barcodes or other optical technologies would be useless. Hence, companies, industries and other institutions adopt this technology. Hongzhi, et al. (2011) worked toward the development of an auto-guard system which was based on RFID technology and mobile communication network. This system was designed to reduce anti-theft rate and meet the intellectualized auto-guard demand of people. This is possible because it has the ability to control the cars states remotely through programmed commands. This auto-guard system combined the frequency identification technology and the global mobile communication network. It used an STM8AF51AA car microcontroller built by Texas Instruments as the control core. This is the same with the IC MF RC522 ra010 reader 0T NXP semlconauctors company wnlcn can IOentlTy car owners quickly and realize the function of keyless entry and keyless startup. Another project conducted in the past is the RFID-based banking system which has an RFID module reader that typically contains a transmitter and receiver module, a control unit and a coupling element (antenna). It used a regulated 5V, 500mA power supply and a three- terminal voltage 7805 regulator which is for voltage regulation. Moreover, it utilized a bridge-type full wave rectifier to rectify the AC output of secondary 230/12v step down transformer. For its RFID module, a separate +5v power supply is required Since it was interfaced with a microcontroller, this system could read the ID CODE in the card. It could also compare this code with the ID CODE stored in the system. When these data match, the door gets opened in a clockwise direction to allow people to get in. After some time, the door automatically gets closed. Similarly, bank transactions were done using this technology. To be able to access the system, the user has to enter his/her user ID and password through the keypad. When the encoded information is correct, he/she can proceed with the transaction. But if the user ID and password remained incorrect after three attempts, the system would be blocked and would sound an alarm together with the three dancing LEDs. In the project developed by RFID technology was integrated with a digital door locking system which authenticates and validates the user and opens the door automatically. It also kept a record of the users check-in and check-out times. With this system, the user is able to check in and out quickly, securely and conveniently by means of putting his/her tag in contact with the reader. This information from the tag is matched with the information which is already stored in the database. When the information from the tag is the same with that in the database, the door will be opened. But if not, the door will remain closed. In this study, RFID has provided a secured solution for the access of space while keeping a record of the user. The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the orresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the user. Conceptual Framework To make this project achievable, the researchers crafted the design requirements first. These include significant considerations of the project tasks such as the development of the circuit layout and the schematic diagram, selection of materials and components and determination of their specifications. The development stage was done immediately after the project was approved. The circuitry was assembled and programming of the system was made. Furthermore, these stages were followed by the evaluation, safety and operation, system functionality test and troubleshooting phases. Conceptual Paradigm 10 De aDle to successTully es taDllsn a ce rtaln project concept, tne proponents considered certain factors. They made a clear presentation of the processes to be undertaken so that the project would be carried out completely. To sum up these processes, they devised a conceptual paradigm which served as their guide in the conduct of the study. Table 1. Conceptual Paradigm Definition of Terms For better understanding of this study, the proponents defined the following terminologies conceptually and operationally. Analog Signal. This is a physical quantity that conveys information about some physical phenomenon in a continuous nature.. The proponents used this term to know the fluctuation signal of the RF. BASCOM. It is an Integrated Development Environment that includes BASIC Compiler for the ATMEL AVR microcontroller family, Editor, AVR Simulator and In-System Programming support for a range of the third party hardware. The Proponents used this to program the microcontroller for the RFID reader. RFID anti-theft detector. It is any device or method used to prevent or deter the unauthorized appropriation of items considered valuable. From the invention of the first lock and key to the introduction of RFID tags and biometric identification, anti-theft systems have evolved to match the introduction of new inventions to society and the resulting theft of them by others.. In this study, this refers to the component of the RFID reader which enables the detection of possible security threats for library properties. It is interfaced with the reader and serves as an alarm when there are theft cases. Radio Frequency (RF). RF is the frequency of electromagnetic radiation in the range at which radio signals are transmitted, ranging from approximately 3 kilohertz to 300 gigahertz. Radio frequency (RF) devices are designed to operate at radio frequencies, defined as electromagnetic waves near and above 1 GHz (0. 3 m).. This is defined as any of the electromagnetic wave frequencies that lie in the range extending from below three kilohertz to about 300 gigahertz and that include the frequencies used for communications signals (as for radio and television broadcasting and cell-phone and satellite transmissions) or radar signals. Radio Waves. Are waves emitted by an oscillating dipole and escape into electromagnetic space much like music from a piano that moves the air near it. Radio waves flow from the transmitters oscillating antenna to the receivers oscillating antenna but not always directly.. In electronics, this means radiation consisting of waves of energy associated with electric and magnetic fields resulting from the acceleration of an electric charge RFID tags. also called transponders, can be classified according to a number of characteristics. A distinction is usually made between passive and active tags.. These are the most mportant links in the RFID systems which have the ability to store information relating to the specific item to which they are attached and to rewrite this information without any requirement for contact or line of sight. In this study, RFID tags are those components which served as the tracker of all library items which are owned by the library. DESIGN AND METHODOLOGY All the procedures and research methods which were done by the proponents to create the RFID reader for Batangas State University-JPLPC Campus library are discussed in this chapter. Likewise, all the requirements that clarify how this study as completed and what testing procedures were conducted are included here. Project Concept A library as an institution of knowledge and a source of information can be vulnerable to security attack such as theft. Because of the growing concern regarding security issues and management of resources in the library, the proponents became motivated to develop a system which can help resolve such problems. This led to the creation of an RFID reader which is applicable in keeping records of inventories and securing items and properties in the library. It was made possible through RFID. RFID s a technology that is now readily available. It is currently used to track animate and inanimate objects throughout the world. But mostly, it is adopted for security purposes because it is convenient and easy to use. And despite the convenience it gives, it does not lessen its ability to detect possible threats. Figure 1 shows the basic project architecture of the RFID reader. It can be depicted from the illustration the operational phases of the project. First, the tags would be scanned by the reader. After it has successfully identified the transmitted data or signal coming from the ntenna, these data would be recognized by the RFID-based system PC which acts as the middleware communication gateway among the system, tags and the reader. Figure 1 . Basic Project Architecture Preliminary Design Illustrated in the following block diagram are the major components that are required in order to develop the proposed RFID reader. These are the materials that are greatly needed in order to make the RFID reader function in a way that is suited to the proposed system. Figure 2. RFID Reader Block Diagram In Hgure 2, It can De seen tnat tne components nave tnelr own Tunctlons as a part 0T the RFID reader. The voltage controller is connected to a power source to distribute the current in the circuitry. It supplies the necessary voltage for the circuit operation of the reader. Meanwhile, the clock generates the delay which is used by the microcontroller to decode the data coming from the transmission of radiowaves. Then the radiowaves are transmitted through the proximity reader via antenna. After the signal was transmitted and analyzed, the microcontroller sends the data to the PC via PC controller. Finally, the buzzer acts as an indicator of the signal that was transmitted to the reader. Materials and Equipment Developing a project involves the necessary materials and correct equipment to be gathered. Materials should be readily available or in other cases, they have to be created. The following are the materials used in the project. RFID tags These components are used in tracking the different resources owned by the library. Through these tags, the inventory process is made easier and more convenient. Also, security of library items is ensured. Anti-theft Detector This device is interfaced to the RFID reader to determine possible security threats. If there are cases of theft, this detector serves as an alarm. Through this, the library personnel are assured of the safekeeping of library items. They also know whether or not these items are checked out of the library premises. Personal Computer A computer is a very powerful and versatile device. It can provide information with just a blink of an eye. In this project, the PC serves as an interface between the RFID reader and the anti-theft components. With an application software, the PC can send and receive data between these two distinct points. Testing Procedure This project underwent certain tests in order to determine whether the system is unctional and beneficial to the possible users. Through testing, the proponents were able to identify defects and errors and provide corresponding solutions. Hardware defects were resolved by means of repair or replacement. Software errors, on the other hand, were corrected through debugging and reviewing of programming codes. Error-detection is critical on this stage. Any errors could cause the project to fail so careful observation and step-by-step procedures were considered. When all the errors and defects were cleared after several trials, all hardware and software components were interfaced correctly and properly. CHAPTER 4 FINAL PROJECT DESIGN, TESTING AND EVALUATION In this chapter, the results of the data analysis are presented. These data were collected and then processed in response to the problems posed in Chapter 1. Two fundamental goals drove the collection of the data and the subsequent data analysis. These goals were established to develop a base of knowledge about the RFID library security system construction as it is perceived and utilized relative to other RFID systems and to determine if the current perception and utilization are consistent with the basic goals or principles of RFID technology. The findings presented here