Friday, November 29, 2019

Short Essay on My Favorite Teacher free essay sample

The economist of the countries decides one line which is known as the poverty line and the one who falls below this poverty line are being considered poor. Poverty is on its peak when it comes to the Asian Countries and most importantly when it comes to the subcontinent. India being so advanced, modernized and developed is still having barriers of poverty and is one of those countries where the poverty is on its peak. Pakistan is also feeling the heat from this curse and poverty in Pakistan is also very much high. There are so many reasons which have contributed in this cause when we analyze the economic condition of Pakistan. The extreme terrorism, natural disasters, political instability and high inflation has played its vital role in making this poverty dragon more giant and devastating. When people are considered to be under poverty, this is the major issue. In Pakistan there are more than 37% people who fall below the poverty line that means their daily earning is less than 2 dollars which makes them less than 60 Dollars a month. We will write a custom essay sample on Short Essay on My Favorite Teacher or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The people on Pakistan are being considered poor when they are unable to get access and advantage form the basic necessities of life. These basic necessities include food, education, cloth and shelter. If an individual does not have good food to eat, or he don’t have such resources to make his children study and provide them education, if he don’t have good and new clothes to wear and at the same time he does not have shelter or roof over his head is considered as poor and is being rated below the poverty line in Pakistan. Once the poverty increases it gives birth to several correlated problems and social issues. If the basic necessities of life are beyond the reach of people than they will surely adopt and select illegal and unethical way of earning that might include begging, theft, stealing and even robbery. This effects the law and order situation of the country. So it is very much important to address this problem of poverty on high priority so that it should be resolved before it becomes the national issue

Monday, November 25, 2019

Background of the Problem Essays

Background of the Problem Essays Background of the Problem Paper Background of the Problem Paper From the very beginnings of antibiotic therapy, scientists have feared that its widespread use can lead to the development of resistant bacterial strains, able to mutate into forms that can sidestep antibiotics. In 1945, as the discovery of penicillin was hailed as a magic bullet that was the answer to so many infections and health problems that beset mankind. However, it is important to note that the discoverer of this first antibiotic himself, Alexander Fleming was aware of the potential dangers of the use of antibiotic, and warned that the abuse and misuse of this wonder drug could foster resistance to it (Sheff, 2001, p.42). In 1941, almost every strain of Staphylococcus aureus was treatable with penicillin. However, by 1950, 60 percent of hospital-acquired Staphylococcus aureus infection was resistant to said drug. Indeed, Flemings prediction has been alarmingly prophetic (Sheff, 2001). According the Centers for Disease Control and Prevention (CDC), 2 million people annually develop an infection from receiving healthcare in the US.   (Houghton 2006) The CDC also indicates that between 90,000 to 100,000 patients die each year from healthcare-associated infection (HAI). This is an extensive problem that affects healthcare worldwide (Houghton, 2006). Problem Statement HAIs exact a high price in terms of human suffering and morality. Moreover, HAIs exert a huge financial burden on healthcare institutions. In a 2004 study that focused on hospitals in Pennsylvania, 12,000 patients were found to develop HAIs during their hospital stay (Houghton, 2006). This translates to $2 billion in additional healthcare costs and at least 1500 preventable deaths (Houghton, 2006). CDC (2006) defined HAIs as â€Å"infections that patients acquire during the course of receiving treatment.†Ã‚   HAIs are unnecessary tragedies because they are highly preventable. In response, the Department of Health released guidelines to prevent HAIs which hospitals were required to adopt (Houghton, 2006). However, the guidelines did not provide precise directives as to how healthcare providers can evaluate their ability to comply with the guidelines or assess the efficacy of their procedures (Carling, Briggs, Hylander, Perkins, 2006). To this end, this research seeks to identify the prevalence of MRSA and VRE bacterial strains in HAIs at the Assir Central Hospital and Khamis Mushait Hospital, and identify how these MSRA and VRE strains are resistant to vancomycin.   Results will then be related to how Assir Central Hospital and Khamis Mushait Hospital evaluated their guidelines and how effective they have been in combating MRSA and VRE in HAIs through vancomycin. Research Hypothesis and Questions The evaluation methods of Assir Central Hospital and Khamis Mushait Hospital have a significant relationship to the effectiveness of combating MRSA and VRE in HAIs. The independent variable is the evaluation methods that Assir Central Hospital and Khamis Mushait Hospital use as far as combating MRSA and VRE in HAIs through vancomycin. The dependent variable is the effectiveness of the said hospitals in terms of successfully combating MRSA and VRE in HAIs. Intervening variables that could affect the outcome of the research are the health practitioner’s level of awareness and education in so far as MRSA and VRE in HAIs are concerned Research question: How cleaning and disinfecting practices affect the problem of HÐ µalth-associatÐ µd infection? Significance of the Study Infections are serious problems because the infection can become systemic and lethal as the microorganisms involved develop resistance to antibiotics (Broadhead, Parra, Skelton, 2001). Moreover, there is no simple answer to address the dangers of antibiotic-resistant organisms and their spread. Roughly 10 to 20 percent of all healthy individuals carry Staphylococcus aureus in their anterior nares at any given time, which indicates the prevalence of this pathogen in the environment (Zaoutis, Dawid, Kim, 2002, p. 313). Exacerbating the problem is the fact that other microorganisms continue to develop resistance to antibiotics and therefore pose a similar threat to public health (Wiseman, 2006).

Thursday, November 21, 2019

The Criminal Justice System Assignment Example | Topics and Well Written Essays - 500 words

The Criminal Justice System - Assignment Example Police brutality is an issue of great concern globally. Torture in cells on claimed suspects by law enforcement is a clear sign of a failed criminal justice system. The perpetrators of such inhumanity are never brought to book. The same supposed law that was meant to protect is the same law that seeks to destroy (Garland, 2002). I believe that if a crime was to be committed but the offender is not brought to book, it still is an offence that is punishable according to the law. This means that one is indeed a criminal despite the fact that they did not get caught in the act of committing the crime. Criminal masterminds that manage to commit crimes and still evade law enforcers do not cease being criminals despite the fact they managed to outsmart the law. It still is a crime and that automatically qualifies them as criminals (Garland, 2002). The conflict model of the criminal justice system argues that for an organization to be fully effective, it should be willing to work competitively to produce justice rather than cooperatively (John, 2005). On the other hand, consensus model also known as the systems perspective of CJS, argues that to produce justice, organizations should be willing to work cooperatively. The conflict model, also known as the System conflict theory, argues that worries over fame, fame, success cause conflict in the justice system itself. Some of the main differences between the crime control and the due process model are; in crime control, repression of crime is the most important function while in the due process, providing fairness under the law is seen as the key function (William, 2001). In the crime control, concentration is placed on vindicating the victims’ rights rather than protecting the defendants’ rights while on the other side of the due process, concentration is placed on the

Wednesday, November 20, 2019

Gay adoption Essay Example | Topics and Well Written Essays - 1500 words

Gay adoption - Essay Example †). This limited scope of adoption is contrary to the legal rights that the validity of gay marriage protects. If the couple find themselves free to openly love one another, why are the laws of the land preventing them from doing what comes naturally to a married couple? That of starting a family. Admittedly, same sex couples are not biologically capable of impregnating one or the other in order to achieve a naturally formed family. We also must admit that as a society there are still millions of children housed in adoption institutions or foster care systems looking for a good home. Good homes are hard to find these days, even with heterosexual couples. So why not give the same sex couples a try? Why not allow them to adopt a child and prove that they too can be exemplary parents to their children, even though they may not share the same bloodline? These adopted children need loving homes, who is to say that a a same sex home cannot provide that? What exactly are the reasons t hat our society still has inhibitions when it comes to allowing same sex couple to adopt? This paper aims to look at the arguments both for and against same sex adoptions with the full intention of providing factual information that will prove that allowing same sex adoptions will prove beneficial to the child and therefore, should be legally allowed across the United States. Let me begin this discussion by presenting the con side of the argument. These arguments range from psychological in nature, all the way to religious defenses. Whatever the argument presented, these non-supporters of the gay adoption cause do so on the same grounds, they are little informed and truly homophobic in nature which is why they are opposed to the love of a same sex couple being shared with a child who wants nothing more than the same. Politicians such as the United Kingdom's Independence party candidate Winston McKenzie has declared that gay adoption should be likened to child abuse and is a violatio n of a child's human rights. Mr. McKenzi claims that there is an abuse of the child's rights because; â€Å"that child has no opportunity to grow up under normal circumstances... There are people out there who bring up their kids encouraging them to believe they are gay themselves. † (Chorley. Matt â€Å"Allowing Gay Couples to Adopt Is a Form of Child Abuse, Says UKIP Election Candidate). It is important to note that Mr. McKenzie is a Christian with anti-gay sentiments therefore same sex adoption was against his religious beliefs. Aside from religious points of view such as Mr. McKenzie's the cause for gay adoption was not helped by the June 29 news that gay father Frank Lombard sexually molested his 5 year old adopted son. Reports coming from the Associated Press indicate that this is a disturbing trend that is emerging from a scientific literature about gay fathers. According to reports: â€Å"The Arrest Warrant documents that Lombard sodomized one of his two adopted Afr ican-American sons and made the boy give him oral sex on-line† (Cameron, Paul Dr. â€Å"Lombard Demonstrates Why Gays Should Not Be Allowed to Adopt†). The main fear of the psychological community is that children in same sex adopted homes are dangerously exposed to child molestation due to the queer lifestyle of the adopted parents. In the peer-reviewed Psychological Reports journal, Dr. Paul Cameron of the

Monday, November 18, 2019

Measuring Up to Customer Expectations Essay Example | Topics and Well Written Essays - 2000 words - 1

Measuring Up to Customer Expectations - Essay Example ith this consideration, the paper intends to discuss about the present customer service as well as expectations within Samsung which have emerged from the delivery of superior products and services by the organisation. Moreover, in the main findings section, various strategies which could be applied by Samsung to deliver consistent as well as effectual customer services within the competitive marketplace will also be evaluated. Apart from these strategies, this paper also provides certain recommendations which can be fruitful for the organisation to sustain customer service excellence going forward. Customer service is regarded as a service stipulation which organisations’ deliver prior to and after a product purchase. Customer service involves a sequence of activities which are designed by an organisation in order to enhance the level of customer satisfaction through delivering products and services as per the customers’ expectations. The significance of customer service may differ in terms of industry, a company’s products and services. Superior interpersonal communication system is quite essential in order to enhance customer services through which an organisation can attain excellent competitive advantage. In the present business scenario, customer service is considered as a significant consideration where every leading organisation always attempts to meet effective level of customer expectation (University of Cambridge, 2012; Newby & McManus, 2002; Richmond/ Wayne County, n.d.). In this similar context, it can be said that customer service is a kind of systematic process which is utilised in order to make certain that customer satisfaction is achieved by delivering products as well as services according to the demands of the consumers. In accordance with the present business situation, customer service generally takes place while operating a transaction process regarding products’ sales and service. Moreover, it is considered as a vital constituent

Saturday, November 16, 2019

Data Mining Techniques in Airline Industry

Data Mining Techniques in Airline Industry Purpose and Scope All around the world, the airline industry could be described in few words, which is intensely competitive and dynamic. The airline industry generates billions of dollars every year but still has a cumulative profit margin of less than 1%1. Many Airlines are trying to recover from deep debt. The reasons for these are multifold- fuel prices, high cyclicality and seasonality, fierce competition, high fixed costs and many other issues related to security and passengers safety. To ensure for the best economic outcome, Airline companies are trying with their most creative asset data. Data used in conjunction with data mining techniques allows comprehensive intelligent management and decision-making system. Achieving these benefits in a timely and intelligent manner may help in resulting lower operating costs, better customer service, market competitiveness, increased profit margin and shareholder value gain. This purpose of this paper is to demonstrate the applications of data mining techniques on multiple aspects of airline business. For example, to predict the number of domestic and international airline passengers from a specific city/airport, to dynamically price the tickets depending on seasonality and demand, to explore the frequent flyer database to prepare for CRM implementation, to makes the operational decisions about catering, personnel, and gate traffic flow, to assist the security agencies for secure and safe flights for the passenger specially after 9/11 incident. Predict the Number of Passenger by applying Data Mining Technique Forecasting is critical to any business for planning and revenue management, especially in the Airline industry, where a lot of planning is required to buy/lease new aircrafts, to hire crew members, to find the new slots in busy airports and to get the approvals from many aviation authorities. In the case of Air travel, lot of seasonality and cyclicality involved. Passengers are more likely to fly to some destinations based on the time of the year. Business travelers are likely to travel weekdays than weekends. Early morning and evening flights are desired by business travelers who want to accomplish a days work at their destination and return the same day. To forecast the number of passenger, artificial neural network (ANN) can be used. The purpose of a neural network is to learn to recognize patterns in a given data. Once the neural network has been trained on samples of the given data, it can make predictions by detecting similar patterns in future data. The growth factors which might influence the air travel demand depend on several things. Mauro Calvano2 in his study of transport Canada aviation forecast 2002-2016 considered 12 major socio-economic factors as follows: GDP Personal Disposable income Adult Populations US economic Outlook Airline Yield Fleet/route structure/Average Aircraft Size Passenger Load factors Labor cost and productivity Fuel cost/Fuel efficiency Airline cost other than Fuel and Labor Passenger Traffic Allocation Assumptions New technology Factors 1 to 5 are related demand side of the forecast Factors 6 to 10 are related to operations and supply side Factors 10 and 11 represent the structural changes This historical data is called the estimation set. A fraction of the overall available data is reserved for validating the accuracy of the developed forecast model. This reserved data set is called the forecasting set because no information contained in it is used in any form during the development of the forecast model. The data in the forecasting set are used for testing the true extrapolative properties of the developed forecast model. The estimation set is further divided into a training set and a testing set. Information in the training set is used directly for the determination of the forecast model, whereas information in the testing set is used indirectly for the same purpose. Figure1: Forecasting Process Model For a given ANN architecture and a training set, the basic mechanism behind most supervised learning rules is the updating of the weights and the bias terms, until the mean squared error (MSE) between the output predicted by the network and the desired output (the target) is less than a pre-specified tolerance. Neural networks are can be represented as layers of functional nodes. The most general form of a neural network model used in forecasting can be written as: Y = F [H1 (x), H2 (x), à ¢Ã¢â€š ¬Ã‚ ¦. , Hn (x)]+ u Where, Y is a dependent or output variable, X is a set of input/ influencing variables, F Hs are network functions, and u is a model error. This input layer is connected to a hidden layer. Hs are the hidden layer nodes and represents different nonlinear functions. Each node in a layer receives its input from the preceding layer through link which has weights assigned, which get adjusted using an appropriate learning algorithm and the information contained in the training set. Figure2: ANN Architecture Abdullah Omer BaFail3 did the study to forecast the number of airline passenger in Saudi Arabia. He selected the most influencing factors to forecast the number of domestic passengers in the different cities of Saudi Arabia. For Dhahran he selected factors like: Oil gross domestic product for last 6 years, private non-oil gross domestic product, Import of goods and services for last 10 years, and population size for last 2 years. The domestic and international actual and forecasted number of passengers for the city of Dhahran for the years 1993 through 1998 is shown below. Forecasts underestimated the actual travel. The Mean Absolute Percentage Error (MAPE) for domestic travel is about 10%, while for international travel is about 3%. Figure3: Forecasting results from Abdullah Omer BaFail3 The take away from the Abdullah Omer BaFail3 for me is that the efficient forecasting model can be invented using ANN if we using the right influencing indicators. In this study some indicators which influence are oil gross domestic product and per capita income in the domestic and international sectors. In view of the fluctuating nature of the passenger usage of airline services in Saudi Arabia, certain suggestions were made. Most of these recommendations were in order to improve the flexibility of the system to the fluctuations in demand and supply. Hub and spike model was also suggested as solutions in certain sectors to increase the flexibility in adjusting their capacity allocations across markets as new information about demand conditions become available. Application of Data Mining technique to predict the Airline Passengers No-show Rates Airlines overbook the flights based on the expectation that some percentage of booked passengers will not show for each flight. Accurate forecasts of the expected number of no-shows for each flight can increase airline revenue by reducing the number of perishable seats (empty seats that might otherwise have been sold) and the number of involuntary denied boardings at the departure gate. Typically, the simplest way is to go for average no-show rates of historically similar flights, without the use of passenger-specific information. Lawernce, Hong, Cherrier4 in their research paper predicted the no-show rates using specific information on the individual passengers booked on each flight. The Airlines offer multiple fares in different booking class. The number of seats allocated to each booking class is driven by demand for each class, such that revenue is maximized. For example, few seats can be kept on hold for the last-minute travelers with high fares and number of seats sold in lower-fare classes earlier in the booking process. Terms and conditions of cancellation and no-show also vary in each class. The no-shows results in lost revenue if the flight departs with empty seats that might otherwise have been sold. Near accurate forecasts of the expected number of no-shows for each flight are very much desirable because the under-prediction of no-shows leads to loss of potential revenue from empty seats, while over-prediction can produce a significant cost penalty associated with denied boardings at the departure gate and also create customer dissatisfaction. In the simplest model, the overbooking limit is taken as the capacity plus the estimated number of no-shows. Bookings are offered up to this level. No-shows numbers are predicted using time-series methods such as taking the seasonally weighted moving average of no-shows for previous instances of the same flight. Figure4: No-show trend over days to departure Source: Lawernce, Hong, Cherrier4 The simple model does not take account of specific characteristics of the passengers. Lawernce, Hong, Cherrier4 in his study used classification method, similarly Kalka and Weber5 at Lufthansa used induction trees to compute passenger-level no-show probabilities, and compared their accuracy with conventional, historical-based methods. I tried to summarize Lawernce, Hong, Cherrier4 approach and results briefly below. Whenever a ticket is booked the Passenger Name Records (PNRs) is generated and all the passenger information is recorded. The PNR data includes, for each passenger, specifics of all flights in the itinerary, the booking class, and passenger specific information such as frequent-flier membership, ticketing status, and the agent or channel through which the booking originated. Each PNR is also specified whether the passenger was a no-show for the specified flight. In the simplest model the mean no-show rate over a group of similar historical flights is computed. The mean in turn used to predict the number of no-shows over all booking classes. The passenger-level model given by can be implemented using any classification method capable of generating the normalized probabilities. The PNR records are partitioned into segments, and separate predictive models are developed for each segment. In the passenger-level modeling we characterize each using the PNR details. Let Xi; i = 1à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦..I denote I features associated with each passenger. Combining all features yields the feature vector X = [X1à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Xi ] Each passenger, n = 1à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.N, booked on flight m is represented by the vector of feature values xmn = [xmn, 1à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ xmn, ià ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. xmn, I ] We know the predicted no-show rate from the historical model; it is assumed the passenger inherits the no-show rate. The passenger level predictive model is then stated as follows: given a set of class labels cmn a set of feature vectors xmn and a cabin level historical prediction  µmhist predict the output class of passenger n on flight m: P(C = cmn |  µmhist , X= xmn ) We are specifically interested in the no-show probability, cmn = NS, and write this probability in the simplified form P(NS |  µmhist , xmn ) The number of no-shows in the cabin is estimated as à ¢Ã‹â€ Ã¢â‚¬Ëœ P(NS |  µmhist , xmn ) The summing of probabilities for each passenger in the cabin, gives no-show rate for the cabin. An analogous approach can also be used to predict no-show rates at the fare-class level. Lawernce, Hong, Cherrier4 compare results computed using the historical, passenger-level, and cabin-level models. The models were built using approximately 880,000 PNRs booked on 10,931 flights, and evaluated against 374,900 PNRs booked on 4088 flights. The figure shows a conventional lift curve computed using the three different implementations of the passenger-level model. Figure 5: Gain Charts Source: Lawernce, Hong, Cherrier4 Each point on the lift curve shows the fraction of actual no-shows observed in a sample of PNRs selected in order of decreasing no-show probability. The diagonal line shows the baseline case in which it is assumed that the probabilities are drawn from a random distribution. The three implementations of the passenger-level model identify approximately 52% of the actual no-shows in the first 10% of the sorted PNRs. This is one of the way the Airlines can incorporate data mining models incorporating specific information on individual passengers can produce more accurate predictions of no-show rates than conventional, historical based, statistical methods. Application of Data Mining technique to Strategies Customer Relationship Management In the current time most of the industries using frequency marketing programs as a strategy for retaining customer loyalty in the form of points, miles, dollars, beans and so on. Airlines are a big fan of this Kingfishers Kingmiles, Jet Airways Jet Privilege, American Airlines AAdvantage, Japan Airlines Mileage Bank, KrisFlyer Miles etc. they all seemed to have carved their own identities. Frequent Flyer Program presents an invaluable opportunity to gather customer information. It helps to understand the behavioral patterns, unveil new opportunities, customer acquisition and retention opportunities. This helps Airlines to identify the most valuable and the appropriate strategies to use in developing one-to-one relationships with these customers. The objective of data mining application over the frequent flyer customer data could be many, but ideally it is as follows: Customer segmentation Customer satisfaction analysis Customer activity analysis Customer retention analysis Some of the examples in each category are: Classify the customers into groups based on sectors most frequently flown, class, period of year, time of the day, purpose of the trip. Which types of customers are more valuable? Do most valuable customers receive the value for money? What are the attributes and characteristics of the most valuable customer segments? What type of campaign is appropriate for best use of resources? What are the opportunities to up-selling and cross-selling, for example hotel booking, upgrade to next class, credit card, etc. Design packages or grouping of services Customer acquisition. Yoon6 designed a database knowledge discovery process consisting of five steps: selecting application domain, target data selection, pre-processing data, extracting knowledge, and interpretation and evaluation. This study refers to the Yoon process to deal with three mining phases, including the pre-process, data-mining, and interpretation phases for airlines, as illustrated in figure below. Figure 6: database knowledge discovery process Source: Yoon6 Some straightforward solution can be implemented that can also be scaled-up in future like K-means, Kohonen self-organizing networks and classification trees. In the case of K-means algorithm, it is applied on customer data, assigning each to the closest existing cluster center. The K- means model is run with different cluster number until K-means clusters are well separated. In the case of classification trees (C5.0), we derive a simple rule set to uniquely classify the complete database. Again, we have to generate the attributes, resulting from the sequence of flight segments. The accuracy of the forecast for each segment is provided by balancing the training set according to equally sized clusters. We regulate the number of subsequent rules, while determining a minimal numbers of records given within each subgroup. Maalouf and Mansour7 did the study based on 1,322,409 customer activities transactions and 79,782 passengers for a period of 6 years. They prepared Data based on Z-Score Normalization and ran the multiple queries and transformed the data to create the clustering input records. They used K-means and O-Cluster algorithms. The result generated by clustering provides customer segmentation with respect to important dimensions of customers needs and value. The table below is the result is a summary of the profile produced by k-means clustering that includes: revenue mileage, number of services used, and customer membership period. Figure 7: Clustering result on Airline Customer Data Source: Maalouf and Mansour7 The results generated by k-means clustering are used as a basis for the association rules algorithm. Two different scenarios have been applied. The first scenario is based on Financial, Flight, and Hotel activities with 1,896 records. The second scenario is based on the flight activities especially the sectors, with 1,867 records. Figure 8: Association rules for best customer activities Source: Maalouf and Mansour7 Some of the take way from Meatloaf and Mansour7 study. Clustering using k-means algorithm generated 9 different clusters with specific profile for each one. From the cluster analysis it can be found which are the best customer clusters (higher mileage per passenger) than other clusters. Need a retention strategy for these clusters. Cross Selling strategies can be formulated between the clusters (for example between: 15 and 11; 13 and 17 because they are close in services value. The cluster analysis provides an opportunity for the airline to produce more revenue from a customer. For example, the airline could apply an up-selling strategy by selling a higher fare seat depending on the clusters. From the cluster analysis Airline may adopt an enhanced strategy for customers in clusters in order to increase services usage and revenue mileage per passenger. Plan for marketing campaign or special offers by analysis through association rules, for example, the customers using the Flight and Financial services never use the Hotel Services and the customers using the Flight and Hotel services never use the Financial Services. By analyzing the services used in different clusters, Airline can characterize services integration. It enables the airline to serve a customer the way the customer wants to be served. Application of Data Mining Application technique to understand the Impacts of Severe Weather Severe weather has major impacts on the air traffic and flight delays. Appropriate proactive strategies for different severe-weather days may result in improvement of delays and cancellations. Thus, understanding en-route weather impacts on flight performance is an important step for improving flight performance. Zohreh and Jianping8 in their study proposed a framework for data mining approach to analysis of weather impacts on Airspace system performance. This approach consists of three phases: data preparation, feature extraction, and data mining. The data preparation phase includes the usual process of selection of data sources, data integration, and data formatting. Figure 9: Framework proposed by Zohreh and Jianping8 He used three data sources: Airline Service Quality Performance (ASQP), Enhanced Traffic Management System (ETMS), and National Convective Weather Forecast (NCWF) supplied by National Center for Atmospheric Research. He used NCWF data from April through September 2000 to represent the severe weather season. These data-sets included the scheduled and actual departure and arrival times of each flight of ten reporting airlines, tail number, wheels off/on times, taxi times, cancellation and diversion information, planned departure and arrival times, actual departure and arrival times, planned flight routes, actual flight routes, and cancellations, flight frequencies between two airports, intended flight routes between two airports, flight delays, flight cancellations, and flight diversions. The image segmentation phase resulted in a set of severe-weather regions. Then for each of these regions, a set of weather features and a set of air traffic features are extracted. A day is described by a set of severe-weather regions, each having a number of weather and traffic features. As a result of this study it was found that there is strong correlation of blocked flights, #of bad weather regions, bad weather airports, blocked distance, bad weather longitude, by pass distance, bad weather latitude, # of bad weather pixels with flight performance. Similarly the clustering algorithms (like K-means) can be applied. The expectation is that the same clusters have similar weather impacts on flight performance. Zohreh and Jianping8 generated clusters for the entire airspace It was found that a cluster with worse weather almost always had bad performance. The clusters with large percentage of blocked flights, bypass distance, and blocked distance had a worse performance. These results were promising and showed that days in a cluster have similar weather impacts on flight performance Other data mining approach which can be applied is Classifications. Application of Classification can help us discover the patterns/rules that have significant impact on the flight performance. Discovered rules may be used to predict if a day is a good or a bad performance day based on its weather. For example Rule for Good: if %BlockedFlights and BypassDistance then Good (n, prob) There can be different ways where we can apply data mining approach to analysis of weather impact on airline performance. It seems to be that results obtained from clustering and classifications were very meaningful for airline and passengers to plan ahead. Application of Data Mining techniques to ensure safety and security of Airlines passenger The reaction of the terrorist attack on 26/9 and 11/9 resultant in increase Security at airports: It ends up allowing only ticketed passengers past the security gates, screen carry-on luggage more carefully for possible weapons. The question is whether these steps could have avoided the attacks, the people involved in the attack had legitimate tickets, and carrying box cutters and razor blades (like in any other normal person would do). The uncommon was the combination of their characteristics, like none were U.S. citizens, all had lived in the U.S. for some period of time, all had connections to a particular foreign country, all had purchased one-way tickets at the gate with cash. With the amount of data available about the passenger during ticketing, the can be reviewed to characterize relevant available passenger information. Given a passengers name, address, and a contact phone number, various data bases (public or private) can identify the social security number (SSN), from which much information will be readily available (credit history, police record, education, employment, age, gender, etc.). Since there is large number of characteristics available on both individual passengers, it will be important to identifying signals within the natural variability or noise. If predicted wrong, this may lead to either falsely detaining an innocent passenger or failing to detain a plane that carries a terrorist. The airlines already collect much data on various flights. When the data come in the form of multiple characteristics on a single item, exploratory tools for multivariate data can be applied, such as classification, regression trees, multivariate adaptive regression splines/trees. The security of the air transportation can be improved substantially through modern, intelligent use of pattern recognition techniques applied to large linked databases. Similarly Data mining techniques can be used for the Safety of the passenger. An air safety office plays a key role in ensuring that an aviation organization operates in a safe manner. Currently, Aviation Safety offices collect and analyze the incident reports by a combination of manual and automated methods.. Data analysis is done by safety officers who are very familiar with the domain. With Data mining one can find interesting and useful information hidden in the data that might not be found by simply tracking and querying the data, or even by using more sophisticated query and reporting tools. In a study done by Zohreh Nazeri, Eric Bloedorn, Paul Ostwald10 it was found that finding associations and distribution patterns in the data, bring important inside. The other finding is Linking the incident reports to other sources of safety related data, such as aircraft maintenance and weather data, could help finding better causal relationships. SumMRry Business Intelligence through efficient and appropriate Data mining application can be very useful in the Airline industry. The Appropriate action plans from the data mining analysis can result in improved customer service, help generating considerable financial lift and set the future strategy.

Wednesday, November 13, 2019

Essay --

Technology With the development of technologies, people always use new technologies like Facebook to communicate with each other. Some people prefer to communicate with other people face to face because they think this can help them understand each other deeply among different populations. Others believe that technologies like Facebook make different people close. When faced with the decision of whether technologies can create more understanding or not, quite a few would claim that convenient technologies keep people apart, and people fail to interact face to face. If people use technologies to talk with each other, they will create lots of misunderstanding. But others, in contrast, deem that technologies can give more understanding as the premier choice and that is also my point. I think technologies like Facebook create more understanding among diverse populations because technologies create more opportunities for communication among diverse populations, help enable people to achieve social i nteraction, boost self-esteem, and help people express themselves in different ways. First, technologies create more opportunities for communication among diverse populations. Nowadays, many different people use technologies to communicate with each other. For example, Facebook has more than 750 million users worldwide. Those users are from different countries, cultures, backgrounds, and experiences. Technologies give people more choices to meet different people. Diverse populations can talk with each other in the same "place" using the technologies. For example, a person who is in America and another person who is in Turkey can talk with each other conveniently and efficiently although they did not know each other before. Technologies faci... ...rt response. On the other hand, technologies can use a system to identify the users' information. For instance, SINA WEIBO, which is a technology like Facebook in China, requires the user to submit his real information, and this system will check his personal information, such as name and ID number. When someone uses this system to commit crimes, the police can catch him easily. With the development of technologies, the online information will be more valuable and correct in the future. According to what we have discussed above, we can draw a conclusion that technologies make different people very close, and let them know each other deeply among diverse population. In the future, a lot of new technologies will appear in our life, and those new technologies will change the ways of our life. What we should do is adopt new technologies, and enjoy our technology life.

Monday, November 11, 2019

Rebuilt Marketing Machine Essay

Per the article The Rebuilt Marketing Machine by Victoria L. Crittenden, the additional 4C’s of strategic marketing are customer centrality, competitive capabilities, company collaborations and cynical connections. Starting with customer centrality, studying what the customer needs and wants are. Creating solutions for all of the different customers wants instead of forcing the customer into a product. Consumers are all about the customer and the customer experience, ensuring the best service. Competitive capabilities open the door with worldwide web allowing most business to have an opportunity to portray themselves as worldwide leaders. Competition leads many businesses to strive for success and beyond. Therefore competitive capabilities allow business to think of ways to improve their businesses. The third C, company collaboration, is an advantage to companies where you can take superior business and combine business to provide customers the best of both worlds. Company collaboration allows marketing to interfere with other departments to ensure high quality of services. The last C in strategic marketing, cyclical connections are vital to the business world through its strategic planning, great marketing skills will be proved through the outcome of business. In order for a company to succeed, a strong formula must be implemented. Although the 4Ps still remain popular in marketing, the matrix needs to be rebuilt due to it no longer being successful for businesses. Business men all know the 4Ps marketing mix framework, due to its common sense there are no longer any advantages. In today’s world, marketing is the key to success and finding ways to better concepts for business success all around the world since marketing is always changing. The gist to marketing is impleme nting new ideas for business success, using the aged idea of the 4Ps is no longer comparative to the advancement of the business world today. Comparing the 4Cs to 3Cs, Porter’s 5 Forces, SWOT analysis, BCG Matrix is important since they all support different ideas. Starting with SWOT analysis, finding out what the strength and weaknesses for business allows better strategy for business growth. SWOT analysis defines the pros and cons of the business where as the 4Cs finds ways to improve the weaknesses. SWOT analysis bring consistency to a business, however if combined with 4Cs it would allow great marketing strategy. Porters 5 forces focus on competition and striving for the top name in leading business. This strategic plan uses the strength and weaknesses of other companies through their own annual reports, financial statements, and mysterious shoppers, etc, to find ways to better business. Whereas company collaboration in the 4Cs, focuses on marketing function in conjunction with other areas in the organization. This allows companies to make decisions on ideas as a whole and not just one team making a decision. The BCG Matrix only focuses on two items the SBU market growth rate and the SBU relative market share, this matrix is based on assumptions and is biased. Due to this the 4Cs implements greater ideas since the BCG focuses on profitability and market share and does not support other marketing ideas. The 3Cs is somewhat similar to the 4Cs however the 4Cs are more thorough in the idea of marketing. The 3Cs provides types of questions to ask yourself when opening a business which are common sense. However, the 4Cs are in depth details of important marketing strategies for building a successful business. In my opinion the marketing mix framework is consumers oriented and fits better in the movement for mass marketing to niche marketing. However, it is out dated and needs to be revised with careful consideration of what the customer wants and needs are. Adding new elements to the framework to ensure better marketing techniques, such as adding another â€Å"P† for customers (people) because without business from the customers, companies will not grow. Also, finding ways to better the customer experience so that customer will be a returning customer and not only focus on making money. The customer will be using social media to rate businesses, speak to family and friends about that customer service experience and are the key for business success.

Saturday, November 9, 2019

Intergovernmental Exercise Example

Intergovernmental Exercise Example Intergovernmental Exercise – Essay Example Intergovernmental Finance Exercise Type A grant The origin of the tax is identified as personal income taxes, corporate income taxes, generalsales taxes and taxes on alcoholic beverages. The allocation of the specified share is identified as the population and the effort undertaken towards paying of the tax. 2. Type G grant This is because the decision is to assist provincial governments hence making it an ad hoc decision without a clear strategy. The cost put towards the â€Å"assistance† has no specified origin or clarity in the amount that is sent out. However, it is significant to tell between it from type H grant since this assistance is done annually. 3. Type H grant The situation falls under type H grant since the response to the situation at hand is ad hoc and the means of assistance are also unplanned. The duration through which this assistance will be carried out is undetermined too. It is also unknown what amount of assistance will be required. 4. Type F grant This is a type F grant because the decision to assist is based on the formula/determination of areas with highest poverty and infant mortality rates and substandard housing. It is differentiated from grant B because the method of assistance is not specified. 5. Type F grant The amount of assistance is not specified (only referred to as a portion of the tax revenue)and the assistance is partial based on the expenditure needs. The method used to determine the assistance is formula based since the distribution is determined by how extra ordinary the needs in expenditure are and on an equal per capita basis grant basis. The decision to give this assistance is also ad hoc. 6. Type B grant The origin of the tax is VAT and the tax distributed is specific. The tax is distributed on a formula based method that is 75% of it is given on the basis of an equal per capita perspective. The rest is given to states that have a below average tax capacity. The fact that it is accounted for tax and distributed by formula makes it a type B grant. 7. Type G grant The government provides reimbursement that is unspecified through an unplanned means. This makes this situation a type G grant. 8. Type H grant The provision of the income tax is annual though the share allocated is not specified (Ad hoc) and the method used to allocate these funds is also unclear (Ad hoc). This makes the situation a type H grant. 9. Type G grant The government repays the local government that is affected by the loss incurred in paying its fiscal need. This is an unplanned decision which pays for approved expenditures which are indispensable public requirements such as learning, public protection and transportation. That gives the basis of the formula used in the assistance hence making it a type G grant. 10. Type K grant The assistance is made as a reimbursement of an approved government project. This automatically qualifies it to be a type K grant. Bibliography Bahl, Roy and Johannes F. Linn. Intergovernmental Finance. New York: Oxford University Press, 1992.

Wednesday, November 6, 2019

What It Means When Congress Is In Recess

What It Means When Congress Is In Recess A recess of the U.S. Congress or the Senate is a temporary break in proceedings. It can be within the same day, overnight, or for a weekend or period of days. It is done instead of an adjournment, which is a more formal close of proceedings. An adjournment for more than three days requires approval by both the House and the Senate, according to the Constitution, while recesses do not have such restrictions. Congressional Recesses A Congressional session runs for one year, from January 3 to sometime in December. But Congress does not meet each and every business day of the year. When Congress has recessed, business has been put on hold. For example, Congress often holds business sessions only on Tuesday, Wednesday, and Thursday, so that legislators can visit their constituents over a long weekend that includes a work day. At such times, Congress has not adjourned but is, instead, recessed. Congress also recesses the week of a federal holiday. The Legislative Reorganization Act of 1970 stipulated a 30-day recess each August, except in time of war. Representatives and Senators use recess periods in many ways. Often, they are hard at work during a recess, studying legislation, attending meetings and hearings, meeting with interest groups, raising campaign funds, and visiting their district. They are not required to stay in Washington, DC, during a recess and may take the opportunity to return to their districts. During longer recesses, they may log some actual vacation time. Some are dissatisfied with the short work week typical of Congress, where many are only in town for three days of the week. There have been suggestions to impose a five-day workweek and give one week out of four off to visit their district. Recess Appointments During a recess, a President can execute a pocket-veto or make recess appointments. This ability became a bone of contention during the 2007-2008 session. Democrats controlled the Senate and they  wanted to prevent President George W. Bush from making recess appointments at the end of his term of office. Their tactic was to have pro forma sessions every three days, so they were never in recess long enough for him to exercise his recess appointment power. This tactic then was used by the House of Representatives in 2011. This time, it was the Republicans in the majority who used pro forma sessions to stay in session and prevent the Senate from adjourning for more than three days (as is provided in the Constitution). President Barack Obama was prevented from approving recess appointments. The case went to the Supreme Court when President Obama appointed three members of the National Labor Relations Board in January 2012 despite these pro forma sessions held every few days. The Supreme Court ruled unanimously that this was not allowed. They said that the Senate is in session when it says its in session. Four of the justices would have restricted recess appointment powers only during the period between the end of a yearly session and the beginning of the next one.

Monday, November 4, 2019

Physical Evidence Research Paper Example | Topics and Well Written Essays - 500 words

Physical Evidence - Research Paper Example This follows that physical evidences always presents exhibits that are directly linked with the scene, the person who conducted the crime, as well as the things such a person may have been putting on during the time the crime was committed. Examples of physical evidences may involve the fingerprints of the criminals, the blood samples collected from the scene of crime, the weapons as well as remnants of the materials used to commit such crimes (Siegel, 2010). Exclusionary rule refers to the rules put in place to discourage the introduction of illegally obtained evidences in relation to certain cases involving criminal trials (Maclin, 2013). The introduction of such illegally obtained evidences in the case trials involving criminal activities may always lead to biased decision-making. This leads to inaccurate decisions from the juries thereby making their verdicts questionable as well as disputable. In addition, the introduction of such illegally obtained evidences in legal processes may deny the accused the right to free and fair trials. This rule provides that any evidence that may emanate from questionable sources and presented by the prosecution with the main aim of fixing the defendant, violating the defendant constitutional rights as well as subject the defendant to unfair trials should not be presented in any courts of law during the trials (Siegel, 2010). It is of crucial significance to note that confessions rule greatly differs with the exclusionary rule in legal terms. Confessions rules may either be judicial or non judicial (Kusonsinwut, 2008). In this regard, it is imperative to note that confessions may be either official or unofficial with regards to several legal perspectives. It is of critical significance to highlight that in relation to common law, each and every statement that is submitted of directed to may person in authority must be

Saturday, November 2, 2019

Use of the scanning electron microscopy in the food industry Research Paper

Use of the scanning electron microscopy in the food industry - Research Paper Example The capabilities of SEM in foreign body identification make the process quite valuable to the food industry. The food industry operates in a spectrum that requires utmost cleanliness and absence of contamination. In essence, the discovery, as well as identification of foreign bodies in food compounds, is a vital activity, which contributes to overall food safety and the assurance of food quality (Smith, 1993). The incident of foreign bodies in food compounds and products can produce a number of dire consequences, which range from process down-time, to consumer complaints that negate an organization’s reputation, to expensive product recalls or litigation. This paper will examine the use of scanning electron microscopy in the food industry discussing its effectiveness in detecting and identifying foreign bodies in food compounds and products. Background In the US, the FDA keeps a close eye on product recalls and categorizes the severity of risks posed by food contaminants. For example, foreign body contamination such as through metal particles or glass fragments, warrants a Class II product recall, which refers to a situation where exposure or ingestion of violative products could cause temporary or medically reversible negative health implications (Vierk, Falci, Wolyniak & Klontz, 2002). Notably, product recalls within the food industry are not infrequent events. ... Recalls related to allergen threats represent at least 36% of all recalled food products. In other countries such as the UK, nearly half of prosecutions related to food faults have been linked to contamination with foreign matter. In the UK, between 1988 and 1994, foreign matter contamination accounted for the largest grounds for defect prosecutions (Graves, Smith & Batchelor, 1998). These instances are viable indicators of the seriousness of food contamination in the food industry. Particulate contamination of food in the industry can occur from various sources. Prior to food purchase, this could include processing issues, for instance, wear particles form conveyors or breakages in the processing plants. Packaging materials, as well as interactions during the storage process, are also noteworthy sources of contamination. Notably, contamination of food products can also occur through parts of the food product, for instance, bone chips found in meat products. According to Lewis (1993) despite quality assurance measures established by food manufacturing and retail stakeholders, contamination can take place subsequent to product purchase within consumers’ homes. Deliberate contamination also occurs for purposes of sabotage or nuisance. Therefore, the detection of foreign bodies in food substances is a critical part of quality assurance and deterring adverse health occurrences in consumers. This detection relies on a variety of established techniques, which include among others X-rays, metal detection and ultrasound (H?ggstrom & Luukkala, 2001). Despite the mode of detection, whenever foreign matter is found in food, two principal questions