.

Wednesday, July 31, 2019

A Sicilian Romance by Ann Radcliffe Essay

The happening takes place at the end of 16th century in Sicily, better in the Castle of Ferdinando Mazzini: â€Å"a man. His first wife, Louisa Bernini, died after giving him two daughters, Julia and Emilia, and a son, Ferdinand. After the death of his first wife, he committed the education of his daughter to Madame Menon and married Maria de Vellarno then he moves to Naples with her and his son while Julia and Emilia remained back at the Castle. The Castle was divided into two main parts and only one was lived by the two young girls, Madame de Menon and some servants. The south wing was left empty and there happed strange events, such as terrifying sounds and strange lights. As soon as Ferdinand’s birthday arrived the count of Mazzini decided to celebrate it within the Castle. Lots of people were invited to join the party; one of them was Hyppolito, count of Verona. Julia felt in love with him as soon as she saw him for the first time even him started to feel something strong for the girl. Also Maria de Vellano, who had already known Hyppolito in Naples, liked him so she tried in every way to separate the two young lovers. In the meantime strange facts continued to happed in the southern wing of the Castle. Julia and Emilia, whose bedrooms were next to this part of the castle, were scared by these terrifying sounds so Ferdinand decided to go and control what was going on. Afterwards he decided to talk to his father about the events and the count of Mazzini revealed him a secret concerning the Castle: there was a ghost that wandered in the south wing, a spirit that belongs to a killed persons. While Julia was falling deeper and deeper in love with Hyppolito, the count of Mazzini decided to led she to marry the Duke of Luano, because of his social class and economical position that was very well, and so in this way he could increase his prestige and his power. He proposed it to his daughter and when Julia refused he constructed her to do his will saying that if she didn’t marry the duke of Luano she would have to became nun. Julia, hopeless, decided to run away with Hyppolito to avoid her father will. While they were escaping from the castle, helped by Ferdinand, they were found and the count of Mazzini hit Hyppolito with his sword. Hyppolito pretended to die. Julia and Ferdinand were imprisoned in two different cage of the Castle. By now everything was ready for the marriage between Julia and the Duke of Luano but when the count of Mazzini went to say his daughter to prepare herself for the ceremony he couldn’t believe to his eyes when he found the room completely empty. Suddenly he sent some servants to look for her in the Castle surroundings, but she was vanished and they couldn’t be able to find her. However researches continued and one day a servant told the count of Mazzini to have found the young lady in a house in the middle of Marentino Forest. Immediately the Duke of Luano and his men rushed towards that place but they didn’t find Julia so they thought she could have run away from the house. During the following days the Duke of Luano deceived to see Julia and Hyppolito so, reached them, he laughs against the man. The man is recognised not as Hyppolito so the two people were set free. At the same time at the Castle Madame de Menon decided to leave the instruction of Emilia and to move to her family property in another area of Sicily. Madame de Menon during her trip across the region found a lady who she recognised as Julia, she has found a refuge in the house of a servant. The day after the two women continued their travel but they were soon stopped and taken prisoners by a group of men. They believed to have been caught by the Duke of Luano instead of by the men who had operated the capture. The women found another refuge in a monastery where they met the sister of Hyppolito, Cornelia. The abate informed the Count of Mazzini about his daughter and so he imposed to the abate himself to give him Julia without any conditions although he would have gone with his servants to the monastery and he would have forced her to follow him. The abate, jealous of his power, didn’t accept the proposal so the girl was safe for the moment.  Mazzini returned back to take his daughter but the abate threatened him to reveal his secret if he would have dared to force the monastery. At this, Mazzini said that he would have returned with many soldiers in order to enter into the monastery. Julia was called by the abate, during the night, to be informed about her chance to live free: accept to live in the monastery. The following day Julia received a visit of his brother Ferdinand who was escaped and who informed Julia that Hyppolito was alive, saved by a servant and moved to the coast. The two people decided to try the escape during the night. During the escape they were imprisoned another time but soon set free by the action of Hyppolito. However Ferdinand was not found yet and the couple decided to persist in their intention when they were surprised by the arrival of the Duke of Luano and his soldiers. Julia went into a cave while Hyppolito fought the Duke. Wandering in the cave Julia discovered a door which lead to the cave where her mother was (She was imprisoned 15 years ago by Mazzini); Julia decided to stay with the mother in the cave telling her about Ferdinand and Hyppolito. In the meantime Mazzini had found the infidelity of Maria and this fact made him very upset. Maria de Vellano desperate about being discovered by her husband decided to suicide. Ferdinand decided to return back to his Castle when a strong storm surprised him during the trip so he was constricted to search for a refuge in a small house where he found Julia, his mother and Hyppolito. A Sicilian Romance ::: Setting Events take place in Italy, precisely in Sicily according to the tradition of gothic novels. Sicily, with its layers of lava forming curious involutions and burning whole houses and villages, is the appropriate setting. For a story so concerned with the interpretation of inside and outside, and the permeable cave. The second half of the 18th century saw the increasing of English travellers going to the natural and artistic beauties of â€Å"Il Bel Paese†. There is an alternation of outdoor and indoor spaces and particularly the presence of subterranean settings, that couldn’t be completely included in the indoor sphere. An example could be the cave of Louisa’s incarceration that is a mediating position between nature (open space) and culure (the caste and generally the human expression). In fact the cave can be reached both from the castle and the natural landscape outside. In concomitance with the presence of subterranean locations there is also the presence of high spaces like mountains and hills. The intention of Ann Radcliffe is to create a link and mediation between high places and low ones along all the narration. In spite of detailed descriptions are frequent imprecision: locations are wrong situated, and big mistakes regards the topography of the places; an example can be the confusion between Alps and Apennines. A Sicilian Romance ::: Characters Characters are stereotyped: Julia, the lady persecuted by the villain, the Marquis of Mazzini (and the duke of Luano), the antihero, (Ferdinand and) Hyppolito. The role of the villain can be considered double, in fact in the novel could be traced two villains: Mazzini and the duke of Luano who helps him. Opposed to the villains there are the antiheroes: the Count of Vereza and Ferdinand the Second. The lady is the piece contended by the two parts of the history: the good and the bad respectively the antiheroes and the villains. The character are all flat because they didn’t change during the story. They are analyzed especially from their actions and their behavior. Apart frm Julia they aren’t analyzed physically. All the most important characters are nobles even if there are some servants who haven’t’ a great influence in the story.

Mental Health the Medical Perspective: a Case Study

The aim of this assignment is to citically examine the medical model in relation to a client that I am working with, for reasons of confidentiality I have used a pseudo name: The medical perspectives in Mental Health. Background Alan is a 42 yr old white british male, he was diagnosed with schitzophrenia at the age of 21yrs. He is the eldest of two children, his sister resides with her husband and children nearby. Alan resides at home with his parents, who are in their early seventies. Alan has always complied with medication, and agreed to hospitalization when necessary, compulsory admission has not been required. Scitzophrenia is a devastating mental illneess, and probably the most distressing and disabling of the severe mental disorders. The first signs of schizophrenia typically emerge in adolescence or young adult. The effects of the illness are confusing and often shocking to families and friends. † http://www. psychiatry24x7. com. schizophrenia retreived 19/01/06. Alan i s seen by his psychiatrist, every six months, unless he is unwell, when he will be seen more frequently. He is reviewed through the Care program approach at hospital out-patients. His key worker is a community psychiatric nurse, (CPN). The psychiatrist plays a central role in the diagnosis of a mental disorder. Diagnosis is made after a mental health examination. The role of the psychiatrist in the mental state examination serves two purposes: â€Å"A detailed history is taken to identify change and characteristic clusters indicative of a specific psychiatric disorder. Secondly the psychiatrist has to make a comparison of change against a diagnostic criteria to establish presence or not of a specific psychiatric disorder. † (Holland, 2003, p. 938) After illiminating organic cause, by physical examination, the psychiatrist makes a diagnosis by classification of the symptoms. In todays psychiatry there are two systems used to more reliably identify a mental disorder. The International Classification of Disease, 10th revision, (ICD10), and the American Classification Diagnostic and Statistical Manual, 4th revision, (DSMIV). European psychiatry are guided b y the former. The ICD10 catogarises schizophrenia under, F. 20. using the description of Kurt Schieder’s first rank symptoms, (1959). These are ranked as A – D, other symptoms E-I have also been added. (p. 49, ICD10, WHO 1992,). For a diagnosis of Schitzophrenia the person must show at least one of the first rank symptoms A- D and at least two of the symptoms, E- I. Alan experiences; – Thought withdrawal, insertion and broadcasting, he beleives that someone or something is responsible for this. (First Rank symptom A). – Auditory Hallucinations, he hears a running commentary about him. (First Rank symptom C). These are also known as the positive symptoms of schitzophrenia. Alan also experiences more than two of the symptoms E –I, he has thought disorder, anxiety,depression and poor motivation, referred to as negative symptoms. (Kingdom, cited Bailey, 2000) The ICD10, goes on to provide subsections for types of schizophrena, and notes; not everyone agrees with the sub-sections, due to the overlapping symptoms that can be present from one type to another. According to Alan’s medical notes and on asking him, he does not appear to have been diagnosed with a specific type of schizophrenia. Given the clusters of symptoms that e has experienced, at various times, it would be difficult to place Alan into one of the sub- sections. The medical model excepts that the schizoprenic brain has increased ventricles, (spaces in the brain), which leads to an imbalance of chemicals in the brain. Using their main tool pshycopharmoglogy, they prescribe drugs to correct this imbalance. (Leonard,2003). The pathology of the illness considers that the chemical wh ich is imbalanced is dopamine. Drugs used to treat mental disorders are known as; neoroleptics or psychotropics, they target the chemical dopamine by blocking the neuroreceptors. The drugs effect behaviour, psychological cognitive function and/or the sensory experience. They also effect other neurotransmitters in the brain, such as serotonan, a chemical associated with affective disorders, therefore, the same drugs are used to treat different diagnosises. (Barry,2002). Alan has been prescribed various psychotropic drugs to try and control the positive and negative symptoms of schizophrenia. His medical notes demonstrate that drugs have been introduced, decreased and increased on a number of occassions, with little effect of relieving the symptoms substancially over a long period of time. Over the years in psychiatry drugs have evolved, Alan has been prescribed some of the older drugs, Chlorpromazine and Haloperidol, these are referred to as ‘typical’drugs. These drugs cause side-effects such as; pseudoparkinsonism, (uncontrolable shaking of limbs), and Akathisia, (an uncomfortable internal restlessness and anxiety). (Barry 2002). Further medication was prescribed to combat these side- effects. Following this Alan’s psychiatrist changed his medication to the newer ‘atypical’drugs olanzipane and risperidone. Alan did not respond to this medication and after a deteration in his mental health he was admitted to hospital and agreed to try another ‘atypical drug’clozaril thearapy. Given the toxicity of clozaril it is not used as freely as other psychtropic medication. A complication of clozaril is the effect that it has on the white blood cells, if the deficiency becomes to great the drug can kill. (Barry 2002). To reduce the possibility of this the white cells are monitered through regular blood testing. The outcome of the long term effect of these drugs is not yet fully known. (Barry, 2002). Psychiatry does not go without critisim, Szass, (1997), best known as an anti – psychiatrist, challenges the concept of mental health as an illness. For an illness to be an illness it has to be classified as having three commonalities, cause – progression – and outcome. He argues that schizophrenia does not share any commonality, and that the reason a scitzophrenic patient becomes a patient is because those around him refuses to except a behaviour beyond the norm. Laing, (1985), also supports this theory and informs the reader that psychiatry is the only medical model that does not have an exact pathology that is proven by labortory testing. Another school of thought suggests; individuals are treated for the side-effects of medication moreso than the original illness, (Illich, cited in Laing 1985). â€Å"They can end up fighting side effects †¦One drug to combat another†¦. Prehaps it is the medication that ends up disturbing mental behaviour, warping personalities or or conditions in to bigger problems. ( Hewitt, 2001, p. 72) Alan prosponed the decision to take clorazil due to the risk of toxicity. Since commencing treatment, the symptoms have reduced but not deminished, he still takes medication for side-effects, anxiety and depression. He continues to struggle with daily living. His anxiety levels are so intense, that this condition has preceeded the effects of schizophrenia, which has led to further isolation from society, he wou ld like to engage in employment, paid or unpaid, however in his current frame of mind this is not a possibility. Labour force 1995, reported that employment figures in mental health patients are much lower than any other disabled group. Only 21% of people with mental health problems are working or actively seeking work. (Webb&Tossell, 1999). Warnings on some medication advise that machinery must not be used, vechiles must not be driven, due to side-effects of drowsiness, alcohol should not be taken with a lot of psyhcotropic medication. All of these restrictions impact upon Alan’s ability to function in society. Secondry to this, Alan has to cope with the stigma attached to mental health disorders. There is a stereo typical societal perception that individuals with mental health issues are more dangerous than others, regardless of research suggesting the opposite; Philo et al, (1993), published research to demonstrate that there is no evidence to suggest that a person with mental health issues is any more likely to harm than anyone else. Figures over the last 20 yrs demonstrate that there has been no increase in murder caused by someone with mental health problems,whilst the increase amongt the general polulation has more than doubled. Research shows that this discrimination within mental health does not stop with the lay person. White, western people have better experience of the service than other ethnic groups. (Haddad & knapp, 2000). The Sainsbury Cenre for Mental Health, (SCMH), (2002), in it’s aim to influence national policy high lighted the inequalities experinced by Black and African Carribean communities. SCMH’s findings suggest that professional have a fear of some ethnic minority groups, due to individual size or skin colour. It is these stereotypical beliefs, cultural ignorance and racist views, that prejudice assessments and influences treatment, reponses therefore rely on heavy medication and restriction. The consequences of which can be dentrimental, and have resulted in death, for people like David Bennett. In response to high profile cases, the Governement have produced various documentation to address issues of inequality. Delivering Race and Equality, (2003), set out to provide an action plan over 7yrs to improve mental health services for ethnic minority groups. The focus is on raising professional awarness around culture, ethnicity and racism. As the western world progresses towards a multi-cultural society, it is inevitable that more people from ethinic minorities will come in contact with mental health services. Fernando, (1991), considers this to be of a special concern and warns that; â€Å"The white domination of black people promotes, and often imposes a cultural domination so that ways of thinking, family life patterns of mental health and mental health care that are identified as ‘European’in tradition ‘white’by racial origin, are seen as superior to others. †(p. 198) Fernando, goes on to highlight the fact that many forms of human distress medicalised by western society are not medicalised by other societies, and notes that political forces dominates what is an illness and gives ultimate power to the psychiatry to treat. Therefore suggesting that individual diagnosis can depend upon where you reside in the world. Rack, (1982), notes that western psychiatry has an important role in social control, whilst Asian psychiatry is largely concerned with spiritual development. Fenando states; â€Å"†¦medicine too is part of a culture and not a system with a life of its own outside the culture in which it lives. † (P. 197) He advises that a reliable diagnosis is unlikely, unless the individual is interwiewed in their own language, as only a person with the same language knows what to look for. If Racks theory is correct then services have a lot to achieve to gain full equality. According to research it is not only the diagnosis in mental health that globally differs, it is also the recovery rate. Research under taken by WHO, (1938, 1958, 1988, 1998), ## evidenced that only 33% of individuals diagnosed with schizoprenia in western soceity were successfully treated by drugs. A further pilot study by the same organisation, in the recovery of schizophrenia demonstrated that recovery rates in London and Washington, (33%, 34%), were immensly lower than in IBADIAN AND MAGA PERDESH, (86%,87%). The variable out come appeared to be talking methods and a positve out look from the onset. People were advised that they would get better rather than being told there future would depend upon medication. Colman, (2004), suggests; â€Å"Most psychiatic doctors appear to be wedded to the idea that they must treat everyone with medication and that it is only through the use of medication that people recover. The evidence for ths view appears to be based on research carried out using moneys supplied by pharmacutical industry. †(p. 4). Colman’s view does not stand alone, Klass, (1975), advises that drug treatment is encouraged by the profit they make for their producers, who also provide the drugs to treat the side-effects. Large profits from the industry is used to provide research and advertise what they view as successful intervention for mental disorders. (cited Pilgrim&Rogers, 1987). In relation to Alan’s drug therapy and the side-effects of anxiety, I have spok en to his treatment team regarding alternative therapy such as; Anxiety Management. The response was that he had this previously and is unable to sustain self help techniques. My view was that this was a funding issue, psychosocial therapy costs more than drug therapy. (Pilgrim&Rogers, 1987). It appears to come secondary to drug therapy in the view of the medical model. â€Å" Whilst it is generally conceded by most commenters on psychiatry that it is now electic†¦ The bias towards physical treatment is still strong. † (p. 121. Baruch&treacher,1978, Roman,1985, Bushfield 1986, cited Pilgrim&Rogers, 1987). Alan has spoke with me regarding the conscequences of stopping treatment to combat the side-effects. Pilgrim & Rogers, (1987), amongst others acknowledge that individuals may stop complying with medication if the side effects from the drugs become intolerable and they are not listened to. â€Å" treating psychiatrists do not take their complaints about ‘side-effects’, or their concerns about the debilitating effects of the drugs, seriously. Instead, doctors tend to be concerned only with the effectiveness of the drugs in symptom reduction (assessed by them, not the patients themselves)’. p. 125 ) If Alan chose not to comply to medication, experienced a deteriation in his mental health and refused voluntary admission to hospital he could be detained under the Mental Health Act 1983. (MHA). The mental state examination would be under took by a doctor who was not exculded under s12 of the act (MHA1983,cited Jones, 2004). In good practise Alan should be assessed by h is psychiatrist and his own general Practitioner. Thus meeting the requirements of s 12 [2], (MHA1983). Both doctors must examine the patient within five days of each other (s12,[1],MHA1983). As Alan is known to the clinical team, and has a specific diagnosis, admission for traetment (s3 MHA, 1983, cited Jones 2004), would possibly be the proposed section. (Code of Practise, 1999, ch5). Laing, (1985), Szass, (1997), claims that psychiatry is used to police society and not to treat the individual. Psychiatrists have been given the power to lock people up and treat them against their will, they have more power than a judge, and hospital wards provide a prison for the unconvicted individuals who do not meet societal norms. The approved social worker,(ASW), also has a powerful role under the 1983 Act and does make the ultimate decision as to whether treatment in hospital is the most appropriate form of treatment. (s13[2],MHA1983). As a social worker under taking the duty of an ASW, (albiet as a shadow), I have been faced with dilema’s whereby the role and duty of an ASW conflict with my social work values, instead of promoting rights and autonomy I am restricting them. I am managing this by addressing the issues in debriefing following the ssessments, in supervision, and by challenging other professional’s practise when necessary. For example, on one assessment, nursing staff had observed a patient as being withdrawn because he chose not to watch television in the communial lounge. During interview, the patient advised that he was a Johava witness and was oppossed to violence which was all that was on the particular channel viewed in the lounge. On addressing this with staff, it was clear that cultural or religous needs this had not been taken in to consideration. If Alan was formally admitted to hospital his psychiatrist does have the power to treat him against his wish. (part IV, MHA1983). This could include invasive treatment such as ECT, which Alan is oppossed to. I am therefore proposing Alan prepares an advanced directive, which will be incorporated in his careplan. Although, this does not over ride the clinical desicion his treatment team will need to take his views and wishes in to consideraton. MHA —————– Alan is supported by his family they have a good insight in to his illness, his father has recently been diagnosed with Alziemen’s disease. My current concern is that his mother is a carer for two family members. The largest proportion of community care is carried out by unpaid family members, who often miss out on employment and become isloated. (Webb&Tossell, 1999). To ensure that Mrs A, is able to continue in her role, her needs also must be met. I have therefore requested an updated assessment under The Carer’s (recognition and service) Act 1995. Mrs. A’s wellbeing is paramount in preventing deteriation of the home situation which would inevitabley impact upon Alan’s mental health. Mrs. A recognises the signs and symptoms when Alans mental health starts to deteriate, which in turn has historially prevented admission to hospital. Research from All Saints Hospital Birmingham evidenced that 59% of relatives recognise early warning signs one month before relapse and 75% two weeks before relapse. (cited Howe, 1998). Mrs. A feels that she is coping at present with the assistance of her support worker she is able to off load. She accesses carer’s groups which she finds helpful. If the situation becomes to much the family have agreed to access further support for Mr. A. nder The Community Care and National Health Service Act 1990. Alan receives support from the day centre where he is involved with Art therapy and other activities. He attends the Fountain club, (a mind project), where he has access to support through group therapy, and attends respite two days a month. Alan finds these resourses useful in helping him to live with not only schizophrena but also the sid e-effects of his medication. He is offered support and advise that is not from a medical perspective. The family also consider that alternative therapy is as important to them, as to Alan. Mrs. A considers that Alan and the family’s needs have been better met since a holistic approach has been under taken, as social and pshcological factors are adressed, aswell as the pathology of the illness. Howe, ( 1998), acknowleges that this has been a general failure in the medical model. I have not progressed with my original task regarding accomodation because I feel that Alan has enough going on in his life at present, in coming to terms with his father’s illness. Although his CPN, considers that this would be in his best interest, the family do not want it and I am not convinced it is what Alan wants either. Szass, (1997), refers to how the mentally ill pateint is considered to be incompetant where as the medically ill pateint is considered to be competant. If Alan did not have a mental disorder, residing at home would not be an issue for anyone, other than the family. I will continue to project my view wtih the CPN and in supervision. In conclusion to this assignment I would agree that all those who work with in this area have far to go in developing services. My role amongst this will be to challenge oppression, by raising awarness as I have done in practise, and to promote an holistic approach towards assessment. I am of the view that medication does help certian individuals, and their life has improved with medication. However in my view this should be minimal to releive distress and enhanced with other socialogical and pyshcological intervention. Although relapse cannot be illiminated, research and literature referenced throughout this assignment suggests that there is a high colleration between staying well and receiving a combination of services. Drawing from my previous managerial experience I have know doubt that the constraints on budgets will effect resources, which will inevitable effect the services individauls receive. Pilgrim&Rogers, (1987), acknowledge that the limitation of resourses and the cost to them, which is not measurable in comparison to physical treatment has been a factor that has prevented psychological and social models from competeing against the medical model. Undoubtabley this will need to change to allow individuals a successful chance of recovery. Authors referred to who opposs psychiatry and its role do have a fair arguement, in that drug treatment and legislation polices society, however no realistic alternative is provided. In my view the way forward is through raising public and professional awareness and de-stigmatising mental disorder. Word count 3297 References Barry, P. (2003). Mental Health and Mental Illness. (7th ed). Philidelphia.. Lippincott. Colman, R. (2004). Recovery an Alien Concept. (2nd Ed). Fife. P. P press. Delivering Race and Equality, (2003) The Sainsbury Centre for Mental Health, breaking the Circles of Fear, breifing 17. A review of the relationship between mental health services and African Caribbean communities. London. Fernando, S. (1991). Menatal Health Race and Culture. London. Mind publications in association with Macmillon. Hewitt, P. (2001). So You Think Your Mad, 7 Practical Steps to Mental Health. Ppppppppppp Handsell Publishing. Howe, G. (1998). Getting in to the System, Living with Severe Mental Illness. London. Jessica Kingsley publishers Ltd. Jones, R. (2004). Mental Health Act Mannual. (9th Ed). London. Sweet &Maxwell Ltd. Laing, R. D. , (1985). Wisdom, Madness and Folly. Making sense of psychiatry. Basingstoke. Paper Mac. Leonard, B. E. (2003). Fundementals of Psychopharmocology. (3rd ed). Wiley. Pilgrim, D. ,and Rogers, A. (1987). A sociology of Mental Health and Illness. (2nd Ed). Pppppppppppp. Open University Press. Professor, Kingdom, (2000). D. Edited by Bailey D. 2000, At the Core of Mnetal Health. Key issuese for practitioners managers and mental heealth managers, Rack, P. (1982). Race Culture and Mental Disorder. forwarded by G. Morris. London. Routledge. Szass, T. (1997). Insanity. The Idea and it’s Consequenses. Syrcuse. University Press. WHO, (1992). The ICD10, Classification of Mental and Behavioural Disorders: Clinical Descriptions and Diagnostic Guidlines. Geneva. World Health Organisation. Webb. R. , & Tossell, D. , (1999). Social Issues for Carers Towards Posive Practice. (2nd ed) London. Arnold. Haddad, P. , & Knapp, M. , (2000). Health Professional’s views of services for schizophrenia – fragmentation and Inequality. Psychiatric Bulletin (24), p 47 – 50. http://www. psychiatry24x7. com. schizophrenia retreived 19/01/06. NICE, (2003). Recommends newer antipsychotic drugs as one of the first line options for schizophenia. Press release. retrieved 19/01/06. Webb site: http://www. nice. org. uk/page. aspx? 0=32928

Tuesday, July 30, 2019

Golkonda Fort Essay

The 13th century Golconda Fort was built by the Kakatiya kings. In the 16th century, Golkonda was the capital and fortress city of the Qutb Shahi kingdom, near Hyderabad. The city was home to one of the most powerful Muslim sultanates in the region and was the center of a flourishing diamond trade. Golkonda was located 11 km west of the city of Hyderabad. According to a legend, the fort derives its name from Golla Konda, which is a Telugu word for Shepherd’s Hill. It is believed that a shepherdboy came across an idol on the hill. This led to the construction of a mud fort by the then Kakatiya dynasty ruler of the kingdom around the site. The city and fortress are built on a granite hill that is 120 meters (400 ft) high and is surrounded by massive crenelated ramparts. The beginnings of the fort date to 1143, when the Hindu Kakatiya dynasty ruled the area. The Kakatiya dynasty were followed by the state ofWarangal, which was later conquered by the Islamic Bahmani Sultanat. The fort became the capital of a major province in the Sultanate and after its collapse the capital of the Qutb Shahi kings. The fort finally fell into ruins after a siege and its fall to Mughal emperor Aurangazeb. After the collapse of the Bahmani Sultanat, Golkonda rose to prominence as the seat of the Qutb Shahi dynasty around 1507. Over a period of 62 years the mud fort was expanded by the first three Qutb Shahi kings into a massive fort of granite, extending around 5 km incircumference. It remained the capital of the Qutb Shahi dynasty until 1590 when the capital was shifted to Hyderabad. The Qutb Shahis expanded the fort, whose 7 km outer wall enclosed the city. The state became a focal point for Shia Islam in India, for instance in the 17th century Bahraini clerics, Sheikh Ja`far bin Kamal al-Din and Sheikh Salih Al-Karzakani both emigrated to Golkonda.[4] The Qutb Shahi sultanate lasted until its conquest by Mughal emperor Aurangzeb in 1687. The fortress held out against Aurangzeb for nine months, falling to the Mughals through treachery. Kancharla Gopanna, popularly known as Bhaktha Ramadaasu, a devout Hindu who constructed Bhadrachalm temple without informing the sultan at that time Tana Shah, was kept in a jail located inside the fort. Golkonda consists of four distinct forts with a 10 km long outer wall with 87 semicircular bastions (some still mounted with cannons), eight gateways, and four drawbridges, with a number of royal apartments & halls, temples, mosques, magazines, stables, etc. inside. The lowest of these is the outermost enclosure into which we enter by the â€Å"Fateh Darwaza† studded with giant iron spikes near the south-eastern corner. At Fateh Darwaza can be experienced a fantastic acoustic effect, characteristic of he engineering marvels at Golkonda. A hand clap at a certain point below the dome at the entrance reverberates and can be heard clearly at the ‘Bala Hisar’ pavilion, the highest point almost a kilometre away. This worked as a warning note to the royals in case of an attack. The whole of the Golconda Fort complex and its surrounding spreads across 11 km of total area, and discovering its every nook is an arduous task. A visit to the fort reveals the architectural beauty in many of the pavilions, gates, entrances and domes. Divided into four district forts, the architectural valour still gleams in each of the apartments, halls, temples, mosques, and even stables. The graceful gardens of the fort may have lost their fragrance, for which they were known 400 years ago Bala Hissar Gate is the main entrance to the fort located on the eastern side. It has a pointed arch bordered by rows of scroll work. The spandrels have yalis and decorated roundels. The area above the door has peacocks with ornate tails flanking an ornamental arched niche. The granite block lintel below has sculpted yalis flanking a disc. The design of peacocks and lions is a blend of Hindu – Muslim architecture. Toli Masjid, situated at Karwan, about 2 km from the Golkonda fort, was built in 1671 by Mir Musa Khan Mahaldar, royal architect of Abdullah Qutb Shah. The facade consists of five arches, each with lotus medallions in the spandrels. The central arch is slightly wider and more ornate. The mosque inside is divided into two halls, a transverse outer hall and an inner hall entered through triple arches. Much thought went in to building this gate. A few feet in front of the gate is a large wall. This prevented elephants and soldiers (during enemy attacks) from having a proper ramp to run and break the gate. The fort of Golconda is known for its magical acoustic system. The highest point of the fort is the â€Å"Bala Hissar†, which is located a kilometer away. The palaces, factories, water supply system and the famous â€Å"Rahban† cannon, within the fort are some of the major attractions. It is believed that there is a secret underground tunnel that leads from the â€Å"Durbar Hall† and ends in one of the palaces at the foot of the hill. The fort also contains the tombs of the Qutub Shahi kings. These tombs have Islamic architecture and are located about 1 km north of the outer wall of Golconda. They are encircled by beautiful gardens and numerous exquisitely carved stones. It is also believed that there was a secret tunnel to Charminar. The two individual pavilions on the outer side of Golconda are also major attractions of the fort. It is built on a point which is quite rocky. The â€Å"Kala Mandir† is also located in the fort. It can be seen from the king’s durbar (king’s court) which was on top of the Golconda Fort. The wonderful acoustic system of Golconda fort speaks volumes about the architecture of the fort. This majestic structure has beautiful palaces and an ingenious water supply system. Sadly, the unique architecture of the fort is now losing its charm. The ventilation of the fort is absolutely fabulous having exotic designs. They were so intricately designed that cool breeze could reach the interiors of the fort, providing a respite from the heat of summer.

Monday, July 29, 2019

Environment Essay Example | Topics and Well Written Essays - 750 words - 1

Environment - Essay Example A continuing increase of greenhouse gas emanates from the burning of the fossil fuels from the ground. Burning of coal is not logical enough since it increases the amount of the carbon dioxide to the environment. According to United Nations environmental study, carbon dioxide emissions to the atmosphere can stop by burying the biomass and pickling of trees. The increment of global temperatures leads to increased melting of snow ice and the rising of the sea level evidently shows the warming of the globe. The warming is determined by high average temperature near the earth’s surface. The temperature increases due to depletion of the ozone layer directly hit by the ultraviolet rays (Haldar, 2010). Temperature rise resultes into many disasters including the formation of cyclones, causing mass destruction to human life and property. The hurricanes, tornados and the typhoons are the worst calamities ever and have claimed several live of individuals. Absorption and emission of the infrared radiation by gases in the atmosphere warms the planets lower atmosphere and the surface. This process means the warming effect of about 33% of the stratosphere. The cutting of trees for energy and other industrial functions increases the quantity of carbon dioxide to the atmosphere, therefore, contributing to global warming. It accounts for 7 percent of the greenhouse gas emission. Forest act as the sink of the carbon dioxide within the atmosphere thereby playing a vital role in controlling the amount of heat produced to the environment. They also help in the absorption of the much water poured inland during the cyclones. Aerosols produced by volcanoes and pollutants from industries causes global dimming and the gradual reduction of the amount of solar reaching the earth surface. Aerosols bring a cooling effect by blocking the direct sun from reaching the earth surface, therefore,

Sunday, July 28, 2019

Organisational Cultural Case Study Essay Example | Topics and Well Written Essays - 1500 words

Organisational Cultural Case Study - Essay Example ..(organization's) own limitations; valuing diversity; and managing the potential dynamics of systemic bias, racism, prejudice, and exclusion within client-health provider relationship† (Srivastava, 2007, p.20). Organisational cultural competence in a health care scenario is also described as â€Å"the ability to provide care with a client-centered orientation that both reflects the client’s cultural values and beliefs and recognizes the impact of marginalization in health care interactions and responses† (Srivastava, 2007, p.20). Rationale for the study What everyone forgets often is that disease has a social context. Cockerham (2007) has shown this by saying that â€Å"income and occupational status join education as the major components of social class† in how people select their health life styles (p.53). WHO has defined that â€Å"health is not only the absence of disease, but also complete physical, mental, and social wellness† (qtd. in Laverac k, 2004, P.14). It is also a known fact that stress, poverty, low socioeconomic status, unhealthy lifestyles, and unpleasant living and working conditions† can cause ill health (Cockerham, 2007, p.1). ... ir opinions, act in real life situations and hold attitudes to their practice are dependent on their culture, which again includes their social class, race, gender, and many similar factors. But a problem arises when these people have an interface with a culturally diverse group of clients. In such a context, there can be a clash of interests, attitudes and values which are culture-specific. For the smooth existence of a service provider-client interface, such conflicts have to be prevented from happening, and this is the realm in which discussions on cultural competency gain relevance. The concept of cultural competence is more than the actions and behavior of one or two individual practitioners but it has to work across the individual, organizational and systemic levels of an organization (Srivastava, 2007, p.20). As far as the people within an organization are concerned, cultural competence has to be ensured from policy and administration levels, through management and to service and support staff. Cultural competence is important in the health care context also because in a health care situation, there is a power relation involved which puts the client in a disadvantageous position in the hierarchy of that power equation. Power being â€Å"perceived as an authority and to engender willing compliance is, clearly, to exercise power,† the service provider can be understood to have power over the client (Fulford, Dickenson and Muray, 2002, p.280). And the exercise of this power has a possibility to be biased by the cultural values and prejudices of the service-provider. In this backdrop, gaining cultural competence through training, awareness and systemic measures can only ensure that non-discriminatory and ethical care is given to all in a health organization. An ideal

Saturday, July 27, 2019

Socialgical research paper Essay Example | Topics and Well Written Essays - 1000 words

Socialgical research paper - Essay Example Additionally, other school discipline issues such as drug abuse, cheating, bullying, truancy, disrespect of authority, and minor misdemeanors plague educational institutions, resulting to innumerable classroom and school disruptions, as well as almost two million suspensions yearly. (Hymowitz, 2000) It comes as no surprise then that most schools in the United States have decided to impose a zero tolerance policy-and it is not something new. According to a survey of the U.S. Department of Education at least a decade ago, of more than 1,200 public schools, approximately three-quarters of schools in the United States have reported practicing a version of a no-tolerance policy-"79 percent had zero-tolerance policies against violence, 88 percent for drugs, 91 percent for weapons and 94 percent for firearms." (Witt, 2007) Many schools enforced this policy after the term "zero tolerance" became popular during the last days of Ronald Reagan's "War on Drugs" and was even made more infamous after a series of high-profile high school shootings, the American Psychological Association reported. Such policy, however, does not come without any controversy clinging to it. For one, according to the Journal of Sociology, "sociologists have historically scoffed at this latter (zero tolerance) policy." (Zajdow, 2005) Not only that, this policy has sparked numerous complaints and protests from the public through the years because of what many see as pointlessness of policies, like students being suspended or expelled for carrying a legal, non-prescription drug such as Advil in their backpacks, having pocketknives in cars, and carrying sharp tools beyond a "woodshop" class. In other cases, the policy was known to have come in conflict with religious freedom, such as the carrying of kirpans, a ceremonial dagger or sword that must be carried by baptized Sikhs. (Zero tolerance (schools)) But much worse than the irregularities is the problem of racism in terms of implementing the zero tolerance and discipline in school, according to the American Sociological Association. In fact, though, the United States is seen as the land of the free, reports of much severe punishment for African-American students than their white counterparts are prevalent. (Free, 2004) In a paper entitled "Zero Tolerance Policies and Alternative Education: Where Do We Go from Here" Janese Free states the following: "The recent rise in school violence and prevalence of weapons in the hands of students in the past twenty years has led to implementing new disciplinary policies in schools- most notably, 'zero tolerance policies.' While these seemingly 'get tough on crime' policies remain popular, criticism and skepticism as to their effectiveness and appropriateness increase daily. The implementation of these policies nationwide has resulted in dramatic increases in school exclusions (suspensions and expulsions). Not only are exclusions more prevalent, but research suggests that a disproportionate number of African American and other minority students are being excluded from schools across the country." (Free, 2004) One the questions that I honestly think should be brought to the fore: Why are African-American students punished more severely than children of other ethnic groups As, the data from the U.S. Department of Education show, "on average across the

Friday, July 26, 2019

Chinese Scroll Painting Essay Example | Topics and Well Written Essays - 1500 words

Chinese Scroll Painting - Essay Example The Chinese vertical scroll is read like a script from top to down. At the top edge of the scroll a semi-circle wooden stave is attached and is used for hanging up. A massive bar fixed at the bottom edge of the painting makes rolling up smoother and faster. The roller is often decorated with the precious materials. It also gives the picture some rigidity when hanging on the wall. The ways of hanging as well as the materials and decorations vary from one period to the other. Hanging scrolls are about fifty centimetres in width and up to three meters in length. The form of the horizontal scroll offers greater opportunity to the artist since the extra pieces of silk or paper could be added while painting. The Chinese painters are not limited in space as the European ones. This is especially useful in painting of the mass scenes and landscapes. A horizontal scroll is composed of few scenes that are divided by the peaces of landscape, usually by a group of trees or mountains. The Chinese scroll has to be viewed from right to left and the viewed section should not exceed sixty centimeters at a time. The left hand unrolls the picture and the right one rolls it up. The beginning section of the scroll is usually left empty for the protective reason, the following section is meant for the title, and special sections of scroll serve as inscription panels. This particular way of reading influences the general composition of the painting. The hand scrolls were not meant to be permanently displayed.

Corporate Social Responsibility and Poverty Essay

Corporate Social Responsibility and Poverty - Essay Example nations have achieved high levels of prosperity based on the support provided to them by private organization that invested in the nations and help out in others ways through corporate social responsibilities initiatives. This paper provides analyzes the effect of corporate social responsibility in developing and developed nations. Corporate responsibility is the commitment of businesses to contribute to sustainable economic development, working with employees, their families, local communities and society at large to improve the quality of life of everyone (Centidamar & Husoy, 2007). The contributions of corporate responsibility towards the sustainable development of a region and the globe can either be directly or indirectly. An indirect contribution of a company’s presence is a region is lowering the government’s unemployment rate by creating a substantial amount of new employment opportunities for the unemployed residents of a region. Coca-Cola is a multinational firm the as of 2003 employed nearly 30,000 people in the People’s Republic of China and creates through the supplier chain effect nearly 410,000 in the country (Thecoca-colacompany, 2007). This beverage company has applied corporate responsibility initiatives to directly help the community of China. Two examples of the types o f social project in which the company donates resources is an HIV initiative which donates on a yearly basis 340,000 RMB to help support 150 organ children infected with the HIV virus and Coca Cola’s sponsorship of the 2012 Olympic Games in Beijing, China (Businessfightsaids, 2007). Corporate Responsibility is a balancing act between the global stakeholder’s interest and the shareholders interest. A shareholder has a narrow mind as far as what they feel is the most important goals since their only interest is to have the value of their investment go up which typically occurs with increase revenue and profitability. The manager of the firm is the one responsible of

Thursday, July 25, 2019

Religion Essay Example | Topics and Well Written Essays - 250 words - 6

Religion - Essay Example Whereas the cycle of life in Buddhism is continuous, the cycle of life in Sikhism continues until one can attain a oneness with God; at which point being freed from the constraints of birth, life, and death. Conversely, Hinduism and Jainism also represent a very old and a relatively newer religion. Whereas many scholars argue that Hinduism may be the oldest extant religion on planet earth, Jainism only came into being around the year 600 BCE. Hinduism on the other hand can definitively be traced back as far as 1700 BCE. Hinduism retains no specific founder and instead rests its claim to truth based upon the universal acceptance that it seeks to inspire. Alternatively, Jainism seeks to integrate three main principles into the life of its adherents: non-violence, non possession, and non-absolutism. Both religions have an array of gods and seeking to understand their respective pantheon requires a great deal of

Wednesday, July 24, 2019

Trust Is Integrity, Honesty, and Reliability Essay

Trust Is Integrity, Honesty, and Reliability - Essay Example Many people argue about the meaning of trust, but the most important aspect of trust in personal and professional relationships is the way we build it together through integrity, honesty, and reliability.   The idea that trust is a one-dimension trait is widely spread, but I find it to be a multi-dimensional act as different aspects have to be taken into account when it comes to building and keeping trust in our personal and professional relationships. Trust in integrity, honesty, and reliability is considered as such by many people.   Some of them equal trust to only one of those dimensions, but I find it useful to deal with the issue of trust as a multi-dimensional trait.   Trust is more a process than a permanent state of affairs.   Trust must be built and kept alive on an ongoing basis, so many factors have to be taken into consideration when we speak about trust in our personal and professional relationships. Indeed trust takes a lot of effort to be built and maintained alive.   It is easy to think of trust as integrity, or as honesty, or as reliability alone.   But if we take a close look at trust, we will find that it takes those three dimensions together to build and keep trust on a daily basis. That is so because if one of the ingredients is missing, we will end up being untrustworthy in the eyes of people. Looking at trust from a multi-dimensional point of view will keep us from making unnecessary mistakes, and at the same time, we will enjoy the benefits of healthy relationships.... Our good will and our efforts to achieve trustworthiness bring happiness and well-being to our souls here and now. Essay 2: Argument. Trust Is Built and Kept Through Integrity, Honesty, and Reliability. Introduction. Many people argue about the meaning of trust, but the most important aspect of trust in personal and professional relationships is the way we build it together through integrity, honesty, and reliability. The idea that trust is a one-dimension trait is widely spread, but I find it to be a multi-dimensional act as different aspects have to be taken into account when it comes to building and keeping trust in our personal and professional relationships. Building and Keeping Trust. Trust as integrity, honesty, and reliability is considered as such by many people. Some of them equal trust to only one of those dimensions, but I find it useful to deal with the issue of trust as a multi-dimensional trait. Trust is more a process than a permanent state of affairs. Trust must be built and kept alive on an ongoing basis, so many factors have to be taken into consideration when we speak about trust in our personal and professional relationships. Indeed trust takes a lot of effort to be built and maintained alive. It is easy to think of trust as integrity, or as honesty, or as reliability alone. But if we take a close look at trust, we will find that it takes those three dimensions together to build and keep trust on a daily basis. That is so because if one of the ingredients is missing, we will end up being untrustworthy in the eyes of people. We need a good mix of integrity, honesty, and reliability in order to build and establish a

Tuesday, July 23, 2019

Answer the Questions Assignment Example | Topics and Well Written Essays - 250 words - 1

Answer the Questions - Assignment Example 2012, p. 295). The purpose behind diversification is that oftentimes a sector will witness decreases in equity value, while another sector will remain stable or even increase in price. The same is true of investments in gold or real estate. A diversified portfolio then allows the investors to shield themselves from unsystematic risk by spreading investment among various sectors of the economy. If one expects the stock market to increase in the upcoming year there are specific ways to structure the beta in their portfolio. Beta is a measure implemented in the capital asset pricing model that demonstrates the volatility of an asset in relation to the volatility of the benchmark the asset is compared to. Oftentimes then benchmark in investment portfolio is the S&P 500. A positive beta indicates that an assets value generally increases when the market increases. Therefore, if one believes that the stock market will increase in the upcoming year they should ensure that the assets in their portfolio have a strong positive

Monday, July 22, 2019

Library System Essay Example for Free

Library System Essay In today’s rapid growth of industries, technology makes our lives much easier and does things with accuracy. Computer is perfect example of technology that was made a great impact in the society. After the effectiveness of the technology had recognized, it caught the attention of different industries. The technology had utilized to help students and faculty to perform much better on what they do. One possible function of this technology was library management system that could provide necessary book information in borrowing and returning books. This system allowed the management to enter in a new book record and retrieved the details of books available in the library. Issuing, returning of books, and maintaining records were some of the capabilities of this system. It recorded all the necessary information needed such as inventory, number of books borrowed and the available books left in the library. This system provided a concrete transaction regarding library resources to ensure the efficiency of the process. It can offer to its borrower through providing functions that help the management to organize all the data needed in executing in the transactions like returning and borrowing of books. It has an inventory records for books for the assurance of its availability. Statement of the Problems Managing a library was definitely a hard task and had needed a lot of time especially when all the transactions were recorded manually like in Library Hub Gapan Division. A borrower should fill up a slip when borrowing and returning books in the Library Hub. Librarian or assistant librarian recorded it on the log book. In this kind of process, the borrowers experienced difficulty in finding books because there were thousand books on the list. Through the systems search function, finding for a specific book became a simple task. It also needed more efforts for both staff and borrower to know if there were enough books to borrow. The library management system provided the number of existing books to ensure its availability. The staff found it hard to make reports and record all transactions because they needed to update every transaction manually. This was eliminated by using the system’s print functions that provided the printed reports in just a click. Objectives General Objective The general objective of this project is to create a Library Management System for Library Hub Gapan Division. Specific Objectives Library Management System should be able to: * provide book reference and its location through a search engine function for the library staff and borrowers; * provide computerized transaction such as borrowing and returning of books; and * print book records such as borrowed, unreturned, and masters list of books. Scope and Limitation This study developed a Library Management System for Library Hub Gapan Division in Gapan Nueva Ecija. This Library System automates the basic library functions to aid in the day-to-day operations of the library. It has different type of accounts like the Administrator and User account. The system has log history, backup, and restores function. It allowed the borrowing and returning of books, as well as printing the records of returned and borrowed books. It had a reset function for account password and could change log in information if necessary. The system provided the book status such as total number of replaced, repaired, and damaged books. The system had no transaction fee or fines for the overdue borrowers. The users could not create their own account. Only the administrator has the full control in the system most especially when updating all the records. In printing of reports, sorting of record is done monthly. It is not capable of printing records with different months at the same time. CHAPTER II BACKGROUND OF THE CAPSTONE PROJECT In exploration, we find new methods, new knowledge, even develop new substances, processes or procedures, imagination and skill was employed by the developer. Today, libraries face the challenge of remaining relevant to the users. The concept of a library staying in one fixed space was slowly evolving. Observation and interview are conducted to understand the Library Hub Gapan Division’s existing system which is a manual process. When users borrow books, the staffs check all the book records to find what users need and check the bins if there are enough books to borrow. Borrowers fill up the borrowers slip to borrow books and proceed to the librarian or assistant librarian to record the transaction and to issue the books. After using the books, borrowers return the books by filling up return slip and surrendering the books to the assistant librarian. Librarian or assistant librarian records it manually in the log book. On the last day of their office hour, they tally all the transactions for the week, manually. The staffs of the library encodes the records for making reports such as the book status, returned, borrowed and master list of books. To fully understand what a Library Management System is, a research for the existing system was done. This research was used as a basis in creating a Library Management System. Ken Chad says that Library automation helps not just the library staff but also makes it easier for library users to get information quickly. Tasks such as viewing the catalogue, putting books on reserve or renewing titles can now be quickly accomplished from a computer. This give an idea that a Library Management System could help the Library Hub to do their day to day transaction, so Library Management System is created to solved the problem of Library Hub Library Management System made by Rolan Alga for Saint Vincent High School was similar to the process of Library Hub. The system of Mr. Alga has book inventory which assures the availability and number of books and compute fines for the overdue books. This allows the user to search, borrow and return book by just entering the book information needed in a specific transaction. The system also allows Printing of reports, restoring and having data back up to secure the records of the library. Tthe only difference of Library Hub to St. Vincent High School is that they don’t have fee or fines for the overdue books; it serves as a pattern to create a Library Management System for Library Hub. This helped a lot to decide where to start and to the interface of the system. The general functions of this proposed library system are beneficial to every school that borrow books in the Hub. It means that the intended audience for this project is not only for individual borrower, but it is also for both library and to the schools who uses the system. This system has all the book transactions needed in the Library Hub. It offers computerized transactions like borrowing, returning books, printing of book reports. CHAPTER III TECHNICAL BACKGROUND Visual Basic is Graphical Rapid Application Development (RAD) tool that aims at providing the user with a graphical interface that was intuitive and easy to use. Visual Basic was a popular programming tool that can be used to write any kind of visual application ranging from a game to a database management application. It was a powerful drag and drop tool that can be used in developing project. Now-a-days Visual basic was being widely used for developing different types of applications because aside from being user-friendly, it has a wide range of support available. Using My Structured Query Language (MySQL) for the back end, with Visual Basic 6. 0 they were known to be a dynamic duo. MySQL was pronounced either My S-Q-L or My Sequel, was an open source relational database management system. MySQL offers secured data basing which make it popular to public. Aside from being secured, MySQL was open source software, user-friendly and also has a wide range of support available. The Operating System will serve as the most important software application that will be used. An operating system (sometimes abbreviated as OS) was the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The application programs make use of the operating system by making requests for services through a defined Application Program Interface (API). In addition, users can interact directly with the operating system through a user interface such as a command language or a graphical user interface (GUI). Computers are needed to develop the project and the available computer that was being used has the specification of 2 gigabyte RAM, 320 gigabyte hard disk drive, Intel core duo for processor and other peripherals such as mouse. The operating system used in developing the project is Windows 7 Ultimate. The Library Management System of Library Hub Gapan Division used four (4) computers in implementing the project. To establish connection to these computers, the topology used to network the computers is star topology which uses hub to connect all those computers. Two (2) of these computers was used by the Administrator, one will be used by the Librarian and the other one was for the Assistant librarian who was in charged of updating and monitoring all the transactions in the library. The other two (2) computers were used by the borrower in searching the books they want and in filling on the computerized slip for borrowing and returning books. CHAPTER IV METHODOLOGY Locale of the Study The proposed Library Management System was for Library Hub Gapan Division located at Gapan, Nueva Ecija. The proposed Library System of Library Hub Gapan Division was beneficial to thirty-three (33) Elementary Schools and seven (7) High Schools with approximately 10,000 students. Organizational Chart LIBRARY HUB GAPAN DIVISION HIGH SCHOOL ELEMENTARY Figure 1. 0 School under Library Hub Gapan Division Library Hub Gapan Divison was a library facility under Department of Education that allows all the schools in Gapan to borrow all the resources of the books available in the library. The schools as shown in Figure 1. 0 were under the Library Hub which are composed of elementary schools and high schools in Gapan Nueva Ecija . Requirements Specification The interview and observation to the client are conducted to understand what are needed to be done in this project. The client was consulted regarding to the process and problems they encountered, what were the functions needed for the project to be very useful to them. The Library Hub is in need of a Library Management System to solve their problems which made their manual process to a computerized one. Based on the interview conducted, this Library Management System shall have the functions of borrowing, returning of books, adding of accounts and books, updating accounts and book records, printing of records, and search functions for finding books. Four (4) computers were used in the implementation of the system and these computers were networked using a hub. In developing the project, the developer started to build the system part by part. He used Visual Basic 6. 0 where designing of system interface and program coding takes place. The developer started to build the system with the log in form which was basically needed to access the system. After dealing with log in, creating the account panels was done that allow the administrator to add new accounts and update the existing records. The next function was book panel where adding and updating of book records are the main concern. Adding and updating of the main records were done, borrowing and returning of books were possible. The developer dealt with borrowed and returned books. The developer placed a confirmation request when borrowing books and this request needs to be confirmed by the administrator. After those functions, the developer started working on inventory which displays the masters list, borrowed and unreturned books. This inventory also displayed the availability of the books. Those records are printable so that making reports would be easier. After the main functions of the system were done, the developer focused on the minor functions such as; (1)search engine which make finding book easy over a list consisting of thousand books, (2)security/ pop-up message, (3)system interface and others. These functions were made especially for Library Hub Gapan Division to assist them in their day to day operation. Requirements Different methods are useful to understand what must be done and what to satisfy the client needs. One of these methods is requirements modelling which was subdivided into different five processes. INPUT -Conduct an interview to the target client. Gathers information that will be needed in the project Review the information and process of the manual library. PROCESS Analyze all the information gathers Transform all the information gathers in input stage OUTPUT The result of this project is the Library Management System for Library Hub Gapan Division PERFORMANCE -It can add book records and accounts for the borrower  -it supports three (3) different type of users -it support saving, updating and printing of library records -keep track all the records of the borrowers CONTROL -The system has a log-in form to provide security. -Creating new user account is done only by the Administrator -It has a two-user level access; the Administrator which is sub-divided into two the one is for librarian and the other one is for assistant librarian. The user (borrowers) is the second type of user level. Figure 2. 0 Requirements Model of Library Management System First is the INPUT wherein conducting an interview was done as a preliminary investigation of project to be. The developer found out that this library was in need of a library management system because of the different problems that the librarian encountered. The second was PROCESS. The developer decided to make a library management system for the client after conducting an interview. This library management system replaced paper and pens in recording data transaction because it computerized the process in which they used computers in making those transactions. Having the Library Management System resulted to an output which serves as the third process. As an OUTPUT, the schools were able to borrow, return and make inventory reports easier than performing it manually. They searched and chose books by just clicking and scrolling. The system also helped the librarian and other staff in recording all the transactions and making good inventory. The fourth method of requirements modelling is PERFORMANCE. In this method, the system can identify how the transaction of the library system has been done. It proved how the system can satisfy the needs of the clients. It keeps all the records of the borrowers of the book tracked. Transactions include borrowing and returning books. CONTROL is the last process wherein the librarian served as the Administrator of this project that holds the full access in the system. Assistant Librarian helped the Librarian to monitor and update the system. The school representative that borrowed books are entered all the necessary data in borrowing and returning books. LIBRARIAN/ ADMINISTRATOR 0. 0 Library Management System for Library Hub Gapan Division ASSISTANT LIBRARIAN SCHOOLS/ BORROWER Return book (s) Borrow book (s) Update accounts View all records Update book records View books information (Status location). View records Update book records book information  printed reports Transaction reports Inventory Print records Print reports Book Information Context diagram shows the system as a whole in its environment. This Library Management System has three external entities (Figure 2. 0). The first one is the Librarian that serves as the Administrator which has the full control in the system. The administrator can update all accounts and book records, borrow and return books, confirmed book request and print records. The Assistant Librarian has all the functions of the administrator except for updating accounts. Borrowers can only view, borrow and return books. LIBRARIAN/ ADMINISTRATOR 0. 0 Library Management System for Library Hub Gapan Division ASSISTANT LIBRARIAN SCHOOLS/ BORROWER Return book (s) Borrow book (s) Update accounts View all records Update book records View books information (Status location) View records Update book records book information printed reports Transaction reports Inventory Print records Print reports Book Information Figure 3. 0 Context Diagram of Library Management System for Library Hub Gapan Division Data Flow Diagram is a means of representing a system at any level. The Figure 3 shows the flow of data in the system. The Administrators can update accounts and book records directly in the system. Through the system, they can borrow and return books, generate computerized books reports as well as printing of book records was all possible. In return, the system provides book information, transaction records, inventory, and printed reports. The system also provides book records that used by the borrowers in searching, borrowing and returning books in the system. LIBRARIAN Account confirmation 1. 0 Log in accounts Tbl_ACCOUNTS DB Account Confirmation Input Log in information Log in Information account information 2. 0 Update Accounts Account information Account found List of account Updated Account information. Use account 3. 0 Adding books Book information Account information List of books Updated Book information Book information DB Tbl_ allbooks Book records 4. 0 View record List of books Book information Book records Use Book information Book record Book information 5. 0 Search books Searched Book information Search book record A Figure 4. 0 Data Flow Diagram (Librarian) DB A returned book records Return Books Print record 8. 0 Confirm request Returned Books information All book records Borrowed books Borrowed book records Return books 9. 0 Print Records 10. 0 Tbl_borrowbooks DB Book Request Printed records A. 6. 0 Borrow Books Book Record Borrowed books Confirm request Book request Book information 7. 0 Reserved Books LIBRARIAN Book information DB Tbl_ borrowedbooks Borrowed books Tbl_ allbooks Book information DB Figure 4. 1 Data Flow Diagram (Librarian) Figure 4. 0 and 4. 1 shows the flow of data using the account of the librarian, he/she needs to log in first to access the system which the log in information was retrieve from the database table accounts. When the Administrator log in to the system, it can create account for the borrowers and update these accounts that are saved from the same database table. After having account, adding of books and update record are can be done and saved in the database table allbooks . These records are can be viewed by all type of accounts which used in borrowing books. When they borrow books a request will send that needs to be confirmed by the administrator and this request can serves as a reservation request. If the request were finally confirmed by the admin it saves to the database table borrowedbooks. In returning books, the data in the table borrowedbooks is being retrieved for it to be returned and this was save into the database table returnedbooks with the date returned. For every borrowed books, this were automatically subtracted to the total number of books in the database and when the books was returned the number of books borrowed were added to the total number of books. The Administrator can print the records on database tables borrowed, returned and allbooks for the reports of the library. LIBRARIAN 2. 1 Add Accounts DB Tbl_ accounts Inputted account Information account record 2. 3 Update account Book record account Information Updated account record Old account record 2. 2 Check account Input account information Checked information Account status Account Information. Updated Account Information Figure 5. 0 Decomposing Diagram (Adding of Accounts -Librarian) The Decomposing Diagram of adding accounts (Figure 5. 0) shows the process on how the librarian will add or edit account information to the system. The Librarian will input the account information given by the borrowers and the system will check the entered information from the database table accounts if there was an existing record. Then if there was no record found it will be saved on the same database table. Librarian can update that account information on the database. LIBRARIAN 3. 1 Input book information. DB Tbl_ allbooks Inputted Book Information Book record 3. 3 Update book record Book record Book Information Updated Book record Old Book record 3. 2 Check book record Book information Updated book list Figure 6. 0 Decomposing Diagram (Adding of Books -Librarian) The Decomposing Diagram of adding books (Figure 6. 0) shows the process on how the librarian will add or edit book information to the system. The Librarian will input the book information on the book he/she want to borrow and the system will check the inputted information from the database table allbooks if there was an existing record. Then if there was no record found it will be saved on the same database table. Librarian can update that book records on the database. Book information LIBRARIAN 6. 1 Input book information DB Tbl_ allbooks Inputted account Information Account record Account Information Check book record 6. 2 Borrowed book information 6. 3 DB Tbl_ borrowbooks Submit Borrowing Borrowed book request Request Figure 7. 0 Decomposing Diagram (Borrowing Books -Librarian) The diagram above (Figure 7. 0) shows the process on how the Librarian can borrow books using the system. The Librarian input the book information will be borrowed then the system checks the records in the allbooks if there are available books to borrow and if there are enough books, the entered information serves as a request and this will be saved on database table borrowbooks which need to be confirmed. DB Tbl_ borrowbooks Borrowed Book record 7. 1 Select borrowed books Book information Book record LIBRARIAN Selected borrowed books information 7. 2 Confirmed Request list Approve Request Approved Book request DB Tbl_ borrowedbooks Check book record Figure 8. 0. Decomposing Diagram (Confirm Book Request(Librarian). The diagram (Figure 8. 0) shows the process on how the Librarian will confirm the book request of the borrowers. The Librarian will select a book request of send by the borrower and then click the confirm button. The confirmed request will be saved on the database table borrowedbooks which need to be confirmed. Borrowed Book record Borrowed book information 8. 1 Select Borrowed book DB Tbl_ borrowbooks Borrowed Book information LIBRARIAN Returned Book Information Borrowed Book information DB Tbl_ returnedbooks 8. 2 Complete Return slip Returned Book information Borrowed Book information DB Tbl_ allbooks Figure 9. 0 Decomposing Diagram (Return Book -Librarian) The diagram (Figure 9. 0) shows the process on how to return book. The Librarian will select a book record and then click the return button to complete the information needed in returning books. This will be saved on the database table returnedbooks and the numbered of books borrowed is added available books on the table allbooks as part of the inventory. Book information List of books Updated List of books New Book information Book information Searched Book information Book information Log in Information Input Log in information Account Confirmation Account confirmation Book  information Old Book information Book record Book records Updated Book record Book information Updated Book record Book records Book records ASSISSTANT LIBRARIAN. 1. 0 Log in Account Tbl_ACCOUNTS DB DB Tbl_ allbooks 2. 0 Add books 3. 0 Update Information 4. 0 View record 5. 0 Search books A Figure 10. 0 Data flow Diagram (Assistant Librarian) DBTbl_allbooks A returned book records Return Books Print record 8. 0 Confirm request Returned Books information All book records records Borrowed books Borrowed book records Return books 9. 0 Print Records 10. 0 Book Request Printed records A 6. 0 Borrow Books Book Record Borrowed books Confirm request Book Request Book information 7. 0 Reserved Books ASSISSTANT LIBRARIAN Book information Input book information Borrowed books DB Tbl_ borrowedbooks Tbl_borrowbooks DB Figure 10. 1 Data flow Diagram (Assistant Librarian) Assistant librarian’s account was somewhat like the account of head librarian he/she must log in first to access all the functions of the system. When the Assistant Librarian was successfully log in to the system it can add new book record which save on the database table allbooks. From this table, the book information was being retrieved for updates and it will be saved on the same database table. This account can borrow books and confirmed book request. After the borrowing books and the request was confirmed, it can return the books which will be saved on the database table returnedbooks. The records in the table returnedbooks is retrieve to view the summary of books returned. It can print records such as borrowed, unretuened and master list of books which will retrived records on different database table. This account is not capable of updating account records and reset borrowers password, as well as the viewing the log history of the system as shown in Figure 10. 0 and 10. 1. LIBRARIAN/ASSISTANT LIBRARIAN. 5. 0 Return books Borrowed books Tbl_borrowedbooks DB Returned books Request confirmed Borrowed book books Tbl_returnedbooks DB 2. 0 View available books BORROWER Account found Log in Information Input Log in information Account Confirmation Account confirmation 1. 0 Log in account Tbl_ACCOUNTS DB 3. 0 Search books 4. 0 Borrow books Book information books Book records Request book Tbl_allbooks DB Book information 5 Confirmed request Request information Figure 11 Data flow Diagram (Borrower) The account of User can search, borrow and return books which were the basic transaction in the Library Hub. This type of account was capable of viewing all the available books in the Library. User account can search for a specific book to locate, view its availability and information. In borrowing books, the user will fill up the computerized borrower slip and wait for the administrator’s confirmation to validate the borrower’s request. Network Topology A network topology describes the arrangement of systems on a computer network. It defines how the computers, or nodes, within the network are arranged and connected to each other. Figure 12. 0 Network Topology for Library Management System The topology used in the implementation of the project was star topology which fit to the situation because this topology was a server based network. The system needed a server and client computers to be more effective. To establish connection between the computers, hub was used. The server was placed on the table of Head Librarian and Assistant Librarian. When the client preferred to use one server for the librarian or the administrator, one computer for the assistant librarian and two computers for the libraries client, star topology is used to establish connection to the computers will be used. Programming Environment Front End Microsoft Visual Basic 6. 0 serves as the front-end in developing this project. This is the marginal tool that used to create this Library Management System. Visual Basic (VB) is a programming environment which was called the drag and drop tool because it contains built in tools like the buttons. The proponent decided to use this drag-and-drop buttons on the window directly to the form to design its interface and code the data structures of the proposed system because Visual basic is user-friendly and has a wide support in both text books and in the web. The front end serves as a tool for creating the different forms and interface of the Library Management System. Back End MySQL serves as the back-end in developing this project. This serves as the data storage of all the information needed to be recorded in the database. MySQL is very fast reliable and flexible Database Management System. MySQL serve as data or record storage of all the transaction of the Library Management System. For every transactions made in the system, data will be saved on the different database table. This database table is where all of the information is stored and retrieved in its operation. To make those database tables, the proponent used WAMP server which has PHPMyAdmin that allows creating and managing the database. It uses a web browser to access it features and manipulate records. Testing In the development of every project, the developer must not commit any shortcomings, problems and/or mistakes. One of the best ways to avoid problems was through conducting a system testing where in it assesses the system. This helped the project to improve and meet its objective. The twenty (20) individual was asked to test the project through an evaluation instrument provided. The developer tested the whole system if bugs exist. If bugs are present, the developer fixed it and makes another test until there’s no trace of errors. After the developer test the system, he asked at least seven (7) IT students to test the system because they have knowledge in this field, at least seven (7) individuals which has a course outside or not related to information technology to ensure its simplicity and understandability. One (1) Head Librarian, one (1) Department of Education official in Gapan and two (2) Assistant Librarian because they were the one who used the system and to get suggestions to improve system functionalities. The evaluation instrument was used to determine what to change and what to add on the system. Lastly, two (2) member of IEAT faculty assessed the whole system and determined the system’s performance. The Head Librarian from the Library Hub, Department of Education official and the proponent from IEAT faculty used the administrator account to evaluate the system; the assistant librarian used the intended account for them which will be the Administrator 2. And the other respondent used the user/borrower account. In short, twenty (20) respondents are asked to test and assess the system. Evaluation instrument guided/helped the proponent to test the whole system. This helped a lot to evaluate the system for Library Hub. This was trial and error basis, when the respondent find errors/bugs on every question, it must fixed the errors first. The developer: 1. Set evaluation instrument and set the units used in the system evaluation and testing. The developer networked the units used. 2. Discussed first all the function of the system and all the information needed to use the system. 3. Actual demonstration on how to use the system by using its every single function. 4. Assist the respondent when they test and evaluate the system. 5. Asked every respondent for their suggestions to make the system perform it full potential. 6. Analysed every suggestions comment and then apply the one that will make the system better. After the system had been assess through the provided evaluation instruments, answers and suggestions have been summarized. Those useful comments and suggestions were applied. Through this evaluation the system performed its function to its full potential. After these changes, the developer ensured that the changes made are seen by the respondent to check if it is correct and satisfy them. Through the use of Evaluation Instrument to test and assess the system, data are collected data were analysed to interpret the result of the system evaluation. The evaluation of the system used three (3) sets of evaluation questionnaires that use the different account level which were the account of Head Librarian, Assistant Librarian and Borrowers that had been summarized to use in analysing the results.

Sunday, July 21, 2019

Impact of IT on Individuals, Communities and Society

Impact of IT on Individuals, Communities and Society Since its inception, IT has had a substantial impact on the world. The ability to access information at the touch of a button has transformed the way we learn. Education and Training have never been the same, before the dawn of the internet. However, all of this is not as amazing as it first seems. Malicious users roam the far reaches of the internet trying to steal peoples bank details, child pornography sites hidden behind proxies and VPNs deep in the dark net, even illegal drug and weapon sales. Online Shopping Online shopping is an amazing invention since its initiation in 1979 by Michael Aldrich. Michael Aldrich connected a 26 coloured consumer television by a telephone line to a real-time transaction processing computer. He called his new invention teleshopping, this is the forefather to our online shopping today. It even allows people who cant leave their homes, such as disabled people, elderly people, single parents and so much more. However, this godsend isnt as brilliant for local shop owners as it is for consumers; it can leave local economies decimated as people that used to be loyal customers move to services like Amazon and ASDA Direct. Not all is how it seems. Although online shopping can be accessible by many people, a lot of people still dont have access to it. 21.6% of UK residents dont have regular access to the internet. This has become a problem for many rural areas of the UK that seem to be neglected by ISPs (Internet Service Providers), low income areas also seem to have a smaller percent of online activity. In 2015 the UK government tried to combat this issue by passing a bill that was intended to provide everyone with at least 15 mbps (megabits per second) internet access for free. As of February 2017 the bill has disappeared. Free time The way we spend our free time has changed drastically over the last couple of decades. From the dawn of social media to the invention of complex graphically intense video games our choices of media consumption during our free time has vastly increased since the very first commercial computers were produced.   Websites like Twitter and YouTube have become the places where most will spend their free time. This has caused content creators commonly referred to as YouTubers, to make a living. Some even become millionaires. Video games have also become one of the most popular forms of peoples pass times, over 33 million out of the UKs 64 million residents play video games on a daily basis. Thats roughly 51% of the total populous, over half! So its no surprise that the British games market is worth a whopping  £4.193 billion as of 2015. Streaming websites are also among the most popular for internet users, they account for roughly 60% 70% of web traffic. They stream videos and other media like music to their users, some of the most frequently visited websites for streaming include: Netflix, Amazon Prime video and music, Spotify and Crunchyroll An anime streaming site. Communication Communication within the IT industry has shaped how we all communicate on a daily basis. From Emails to Short Message Service (SMS), daily communication has vastly changed from the days of letters and telegrams; this is thanks to the wide adoption of computers and mobile devices. This has only improved as technology has advanced to the internet vastly improved what mobile devices could do thus allowing us to communicate in better and faster ways. With the invention of 3G (short for 3rd Generation, in reference to it being the 3rd iteration of wireless mobile technology).   Users could surf the web from their devices. This newly found technology paved the way for smartphones, has the technology improved with H/HSDPA (High-Speed Downlink Packet Access) offering a theoretical 7.2 mbps connection speed and later H+HSPA+ (Evolved High-Speed Packet Access) offering an insanely fast theoretical speed of 168 mbps. Legal Impacts The legal impacts of IT have always been up for debate, whether it was the ability to copy games from cassette to cassette or the sudden unlimited access to bountiful amounts of information that came from the incredible creation that is the internet. In order to protect peoples data and information, many governments around the world implemented improved copyright and plagiarism laws. In the UK this law is called the Copyright, Designs and Patent Act 1998. Law lays down foundations to help copyright and patent holders to take legal action again those who steal their works. Hacking, Fraud and other malicious acts also came along with the dawn of commonly available personal computers. The UK government passed the Computer Misuse Act 1990, this bill outlined the dos and donts when it comes to computer use; accessing a computer without permission is considered a crime under the Computer Misuse Act.   Ãƒâ€šÃ‚   Ethical Impacts The ethical impacts of IT mainly from the constant documentation of our information from services such as Google and Amazon has been a heated topic for several years. Should we allow such services to store our personal information and information about items we like or search most often? Although there are many benefits in allowing such information to be stored which can help to form algorithms to better improve our online experiences with search engines and online shops. This can allow services such as Amazon target specific advertisements to be shown to us based on our interests and to have products recommended to us based on our past purchases. However, if this information were to reach the wrong hands, such as a fraudster, it could be extremely dangerous to the users whom data has been stolen. Another ethical question that comes to play with the use of IT is for those who dont have access to high-speed internet that may of us take for granted. For instance, many people who live in rural areas of the UK dont have access to broadband due to the vast distance between them and the telephone exchange. In some cases, even trying to install cables for rural areas are just impossible due to the high cost and low reward aspect of the area. For a broadband company it is more profitable to place expensive high-speed cables in densely populated urban areas since the vast amount of customers would allow the companies to recover their investments much quicker. There are solutions to this however, many mobile communication networks have started providing 4G internet access to those who cant get access to the internet or who have rather weak connections. Most of the time these solutions are cheap and quick to set up however the 800Mhz (megahertz) frequency band, previously used for analog ue television, used by most telecommunication companies although has far reach due to its small wavelength this has the negative effect of not having the ability to transmit as much data as a fibre optic cabling. Life before computers As much as it is hard for some of us who have grown up with and around this amazing technology, we must not forget that computers have not always been around. Even earlier versions of cameras have been around longer than computers. Video games, Instant messaging, Email, DVDs, Cassettes, Laserdiscs: There was a time when all of these werent even thought of. A time of newspapers and radio, vinyl disc and Classic music and Jazz. Going outside to play with friends, working for a sixpence, 240 pence to a pound, before the days of post decimalisation. I asked my Nan about what it was like growing up, what she would have liked to do when she left school. Getting a job as a typist working for the Ministry of Defence (MOD) was one of the flashiest jobs for women to get, everyone wanted it. Sustainability The sustainability of our modern technological position has been a question for many centuries. What can we do to help preserve our environment and sustain our current lifestyle? Recycling our old hardware and reusing the precious metals inside them can help us since it uses less energy to regain these metals than it does to mine and refine them. Another advantage to this is that metals are also a finite substance and we only have a set amount of it. Moving to a more sustainable energy source to power our homes and electronics is also a vital way to be stainable. Solar, wind and nuclear energy are the current candidates for us to replace our dependent on fossil fuels. All three of these present a positives and negatives but one thing they all have in common is their amount of pollution they produce or lack there of. PAGE 1 OF YOUR BLOG: Understand the impact of IT on individuals, communities and society. Impacts Social Impacts How we spend free time. Effects on local communities PAGE 2 OF YOUR BLOG: ECONOMIC IMPACTS Employment structure and working practices. Sustainability. PAGE 3 OF YOUR BLOG: Legal impacts Ownership, copyright and plagiarism PAGE 4 OF YOUR BLOG Ethical impacts Privacy of information PAGE 5 OF YOUR BLOG Activity from page 23 Life before computers investigate and write up in your own words.

Consumer Preferences In The Indian Banking Industry Marketing Essay

Consumer Preferences In The Indian Banking Industry Marketing Essay The Indian banking industry has witnessed a robust growth during the last decade. There are various public, private and multi-national players operating in the industry. Though the importance of better customer service quality is understood in the sector, there exist various other factors that customers consider while evaluating banks. In this paper, the customer preferences in the Indian banking industry are studied using conjoint analysis as a statistical tool. The three product attributes that are analyzed are bank timings, ATM network and customer service reputation. The results show that customers pay a lot of attention to the customer service reputation of the bank. The facilities of the bank regarding branch timings are also looked up by the customers. Adequate recommendations towards gaining competitive advantage are presented at the end of the paper. Key words: Conjoint Analysis, Indian Banks, Consumer Service Introduction Product selection is a complex decision making process involving resolving various trade-offs. For example, a basic trade-off might involve striking balance between better product features and right price. Since an ideal product consisting of the best possible product features is not always feasible, it is important to learn the customer preference for various product attributes. This information can be used by organizations in an industry during product design and improvements in the current product offering. Conjoint analysis is an advanced marketing research tool that finds applications in developing an effective product design. It helps the researcher narrow down the product attributes that matter to the customer and quantify the importance attached to various product attributes. Hence, we can answer which attributes are the most important and which are the least important, as discussed in IBM SPSS (2012). The analysis requires the development of an appropriate questionnaire where in a respondent is required to highlight their preference towards various product attributes combinations. Recently, the technique found applications in various industries to assist product developers and established players towards effective product design. For illustration, Conjoint Analysis is used in Measuring Consumer Preferences for Sales Promotion Schemes in FMCG Sector in Vyas (2005). Hence, any study that contributes in understanding customer preference in an industry is critical towards the development of detailed customer profiles and effective product design. In this paper, we explore the application of Conjoint Analysis in understanding the customer preferences in Indian banking industry. The application of Conjoint Analysis in the banking industry can help us better understand the industry in the following ways: Understanding product attributes relevant to customer- the study helps us understand the attributes that are at top of the priority list of the customers. By analyzing the weights attached to various product attributes, organizations can design their finance products in a better way. Actionable recommendations- The recommendations of the analysis are actionable. For example, issues like interest rate and basic loan terms that are not under the control of bank are not included as a part of actionable and feasible recommendations. However, banks can work towards improving customer service location, attractive location of ATM and comfortable timings of the branches. Applications- The applications of the study could be used in benchmarking Indian customers against their global counterparts in understanding and predicting the next evolution in the Indian banking industry. The results could be used together with Multidimensional Scaling for organizations seeking entrance in the industry or for existing players in understanding brand positioning. Hence, the aim of this analysis is to study the Indian banking customers and find out the utilities of all the product attribute levels and their relative importance. This is done by applying Conjoint Analysis. Due to paucity of time, the study is limited to the bank customers based out of Delhi region. The respondent set is the FMS MBA students. The study aims to find the customer preferences that are important to the customers while evaluating banks. This study is an exploratory research that can be used for future larger studies. Section 1 of the study provides a short introduction of the subject matter along with a brief background. Section 2 delves into the existing literature in the area, which has focused on the same subject matter. Section 3 describes the methodology adopted for the study, including the data collection and analysis. Section 4 discusses the results and findings of the analysis. Literature Review There have been various studies in the past that explore customer preference attributes in various sectors, in India and abroad. We discuss those studies where Conjoint Analysis has been used. ÃÆ'Ã…â€Å"lengi (1998) explored the customer preference in the Turkish Banking industry. They concluded that among other factors, facilities like extended loyalty programs, off-site ATMs, maximum 5-minutes waiting time in the branches are most preferred by the customers. With respect to higher order decision constructs, they also concluded that delivery channels and customer relations have the strongest influence on the respondentà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s preferences. Another study in this domain by Trchrome (2008) also explored the customer preferences in the banking industry. They concluded that customers give importance to type of bank, minimum balance requirements, online banking facilities, customer service quality, and ATM network while evaluating bank options. Of these options, customers give highest importance to balance/fees requirement at the bank (34 %), online banking facilities (24 %) and the type of bank (11 %). In line with this publication, Auruskeviciene, Salciuviene and Virvilaite (2005) explored the banking industry to quantify the marketing image of financial services. There results were as following: service quality (41%), prices of services (26%), convenience and availability (17%), variety of services (13%) as well as bank exterior and interior (3%). As we observe from these studies, customers see a lot of factors while evaluating banks. Of these, branch timings, customer service quality and ATM positioning were explored in the present study. There have been other studies in the sub-segments of the banking industry. Cai and June (2001) analyzed the Internet banking industry to study the change in customer preferences in this sub-segment of the industry. They found out that customer service reputation, banking service products and online systems quality matter the most to the customers in online banking. Kubica (2011) used conjoint analysis to segment young clients in the banking industry. They concluded that profiling young customers is a complex process. Png (2003) explored the specific problem of the amount that could be charged to customers for waiting time. While it can be seen that conjoint analysis has been applied in the global banking industry, its applications in the Indian context is limited. Conjoint analysis application in Indian sectors such as tourism, private label brands (apparel), air freshener and automobile sectors is present. There have been a few studies that explore the consumer preferences in the Indian banking sector. Ananth, Ramesh and Prabaharan (2011) analyze the service quality gap analysis (structured questionnaire) for Indian private banks. They conclude that there are some dimensions in the service quality that are lacking (empathy and accessibility). Komal and Rani (2012) also explore the customer preferences in the domain. The key results are that ATM service quality, internet banking services, credit cards portfolio are important factors considered while evaluating banks. Ananth and Arulraj (2011) measure the banking service quality in Tamil Nadu. They concluded that credit facility (interest rate), Corporate Social Responsibility initiatives and deposit schemes are the most appealing to the Indian consumer. As we see, there is no significant study in the application of conjoint analysis in the Indian banking sector. Hence, the motivation behind this study to explore the consumer preferences in the Indian banking industry through Conjoint Analysis. We intend to understand the product attributes that a prospective bank customer considers while evaluating an Indian bank. Methodology This is an exploratory study. Hence, no hypothesis is formulated. After the results of the analysis are obtained, hypothesis can be developed. Convenience sampling is used for the study. The sample size for the study is 51 respondents. The respondents are from the Full Time and Part Time course of the MBA program at FMS Delhi. The respondents were provided with the questionnaire that requires them to rate the various product-attribute combinations on a scale of 0 to 10. The average age of the respondent set is 29.9 years (standard deviation: 6.98 years) and the average work experience of the respondents is 6.53 years. After carefully reviewing the contemporary literature, the following factors were found relevant to our study: Branch Hours: The time duration for which the branch is open ATM Network: The location of the ATM network with respect to positioning near the branch or at other places Customer Service Reputation: The customer perception of the quality of services offered to customers. The level of these product attributes are as following: Factor Description Levels 1 Branch Hours Weekdays 9-4 The branch timings are from 9 AM to 4 PM Weekdays 9-7 The branch timings are from 9 AM to 7 PM Weekends also The branch is open on weekdays as well as weekends 2 ATM Network At branches The ATM is available only at branches At branches others The ATM is available at branches as well as at other locations 3 Consumer Service Reputation Good The consumer perception of the consumer services is good Average The consumer perception of the consumer services is average Poor The consumer perception of the consumer services is poor Table 1: Product Attributes and Levels As we observe, there are 18 possible combinations out of these product attributes and levels. The 18 combinations or profiles are presented to the respondents in a survey. Beside the responses, other information like respondentà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s age, work experience, sex and absence/presence of a bank account is also collected. Based on the collected responses, conjoint analysis is applied to find out the part worth estimates of the various product attributes. Since the number of attributes is 3, traditional full-profile methodology of conjoint analysis is used. Based on the responses, dummy variable regression is used to find the respective part-worth functions for each respondent. These results are then aggregated to find an overall result. Findings The data from the 51 respondents is analyzed to find out individual, unique part worth functions. The utilities of the various product attributes are as follows: Attribute Level Aggregate Utility Standard Deviation Branch Hours Weekdays 9-4 -1.01 1.18 Weekdays 9-7 0.96 1.02 Weekends also 0.05 0.53 ATM Network At branches -0.38 0.44 At branches others 0.75 0.88 Consumer Service Reputation Good 1.59 0.86 Average -1.62 1.10 Poor 0.03 0.65 Table 2: Aggregate Utilities of Product Attributes and Levels As we observe, the utilities have comparable standard deviations to the aggregate value. The importance of the various product attributes are as follows: Product Attribute Part Worth (%) Branch Hours 34.2 ATM Network 17.1 Customer Service Reputation 48.7 Table 3: Part Worth of Product Attributes As we observe, the customer service reputation (48.7 %) is the most important product attribute among the three product attributes. This reinforces the pre-existing perception that customer service reputation is a key factor that is evaluated by the prospective customers. Second, branch hours (34.2 %) as a product attribute is another important attribute that is evaluated by the customers. Positioning of ATMs is the third parameter that is used during customer evaluation (17.1 %). These results highlight the importance of customer service reputation in the Indian banking industry. Indian banks must attempt to improve the customer perception to gain a competitive advantage. An improved service reputation assists the bank in improving the competitive position of the brand. For a new player that is seeking entry in the industry, investments must be directed to improving the customer experience and customer perception about the same. Next important parameter is the timings of the branches. As seen, usual timings from 9-4 PM are the least preferred. Customers look forward to some sort of facility in this regard. It can either be related to longer branch timings like 9-7 PM or branches being open on weekends. Since the respondent set had people with and without work experience, option of branch hours extending after the usual 4 PM is useful to the working professional. Finally, the positioning of ATM is another important parameter evaluated by the customers. ATM location at the branches and at other places is an attractive preposition. Since it is an exploratory study, there is a further need for a study with a bigger respondent set and product attributes that would throw deeper insights into the importance of other product attributes to the Indian consumers.