Thursday, October 31, 2019

Human Resource, Development of Employment Packages Essay

Human Resource, Development of Employment Packages - Essay Example At this level of annual income, he will be able to maintain his cost of living in Texas. This salary will be complemented with a benefit plan comprised of employee assistance program; basic life, long term disability, and personal accident insurance; medical and dental care plans; time-offs; and a retirement plan. He will also be given company sponsored trainings and programs to further his skills and competencies. The incentive plan will make him eligible for year-end bonuses, profit sharing, and salary increases. In this business organization, employees have always been considered as strategic partners who help it achieve all its corporate objectives and goals. In line with the company's goal of motivating its employees to excel in their given positions, it is very important to create a compensation package, incentive plan, and benefits plan which looks at the needs and preference of the human resource. However, the company also needs to balance with its goals of profitability. Higher salary, incentive, and benefits for employees mean allocating a huge portion of the company's revenue to cover its costs. The aforementioned considerations have been the major foundation of the compensation package, incentive plan, and benefit plan drafted for James Richard. ... It should be noted James graduated from an accredited university in the United States and had accepted an entry-level engineering job in a manufacturing firm in San Antonio Texas and stayed there for five years. His interview with us shows his high level of knowledge and skills together with his commitment and responsibility in his previous job. Thus, the company we would like to hire him as we see his great potential and his productivity. The compensation package will be based on the average compensation of electrical engineers in the United States, the difference between the cost of living in San Antonio, Texas and here in Illinois, and the perceived value of James Richard for the company. According to the Bureau of Labor Statistics (2005), electrical engineers have an average hourly rate of $36.57 and an average annual salary of $76, 060. The lowest paid electrical engineers get $22.96 per hour while the highest paid ones get as high as $53.16 per hour. On the other hand, the annual wage ranges from $47,750 to $110,570. It should also be noted that according to the survey, Texas is one of the top five states which pays the highest to its employees. Electrical engineers in Texas are paid $40.47 hourly wage and have an annual mean wage of $84,180. It is assumed that James Richard is earning the average wage which is $84, 180. Furthermore, the cost of living in Chicago, Illinois is 16.5% higher than in San Antonio, Texas (Salary.com 2007). In order to maintain his current cost of living, he will need to find a job which pays $98,091. However, it should be noted that employers in Illinois typically 13.2% more than in Texas which means that if

Tuesday, October 29, 2019

Planning and Design Essay Example | Topics and Well Written Essays - 2000 words

Planning and Design - Essay Example It enables to prepare an efficient schedule for completing the project within a specified time (Public Procurement Guide, 2008). Resource Planning In this stage, the management should be focused on determining required materials or resources, laborers and tools that are required in each step of the project. This step would be useful for making proper allocation of available resources in required places. It would also facilitate to avoid any improper allocation and wastage of valuable resources so that the project completes in time (Public Procurement Guide, 2008). Cost Planning Preparation of plan with respect to allocation and use of cost is one of the vital parts for the management in the project plan. The stage comprises proper identification of required costs including internal and external costs. It also enables to make assessment of the amount of time required to complete the project, so estimation can be made regarding the budget of the project and whether the project would re quire over-budgeting or not (Public Procurement Guide, 2008). b. ... With this concern, Spencer Moneysworth consulted with Expert Industrial Developers (EID) regarding making an estimation of cash flow chart for the project. However, the EID provided an estimated plan of USD20 million with a schedule of 18 months for the project. However, the intention for Woody 2000 project was to prepare the project within USD17 million by including one million for first and last month and USD1.4 million each within the rest 10 months during the project. Moreover, the cost planning of EID depicts an excessive use of capital along with making an estimation of longer schedule for the plan including professional services and construction works. With this concern, it can be said that there is a requirement for making evaluation of available alternatives in terms of accessible contractors that can provide lowest possible cost with efficient time schedule for the project. In the successive phases of the project, the aspect of proper time scheduling would be crucial as it can largely affect positive or negatively on the factors such as project budget, delay and accessibility of resources among others (Public Procurement Guide, 2008). c. Did the project plan explain how the project and any changes would be controlled? Should this be part of the plan? Give reasons. The overall plan for the Woody 2000 project explains the facet of bringing in changes by involving software as well as hardware to efficiently complete the project related tasks. By appointing Ian Leadbetter, a mechanical engineer, specialized in ‘programming semi automatic manufacturing machinery’, efficiency in the whole process of project schedule was desired to be brought. This aspect

Sunday, October 27, 2019

Replica Node Detection using Enhanced Single Hop Detection

Replica Node Detection using Enhanced Single Hop Detection REPLICA NODE DETECTION USING ENHANCED SINGLE HOP DETECTION WITH CLONAL SELECTION ALGORITHM IN MOBILE WIRELESS SENSOR NETWORKS 1. INTRODUCTION Sensor systems are being theme of enthusiasm among the scholarly community and industry because of those broad variety relevance in different system situations. WSNs comprise of an expansive number of little sensors, generally sent thickly in the objective territory to gather important information [1, 2]. Hubs pertaining to Sensors are asset obliged because of their little dimension plus it restricts the capacity of calculation and correspondence. The most widely recognized utilizations of WSNs incorporate living space checking, fringe watching in military, movement observing, and quiet observing in human services [3, 4]. In MWSNs [5, 6], hubs pertaining to sensor have extra portability capacity to meander inside an objective region. Versatile sensor hubs can give precise information contrasted with static hubs. The sensor quantity needed in MWSNs to cover an allocated region is extremely smaller than static WSNs. By and by, thick sending of portable hubs bolsters high unwavering qua lity and load adjusting. Regardless of all focal points, MWSNs have an exceptionally dynamic system topology because of versatility. Along these lines, the difficulties are duplicated contrasted with their static partners. The real difficulties incorporate correspondence, scope, distributive helpful manage, and safety [7, 8]. Safety has dependably been a basic issue of worry in WSNs [9]. WSN (Remote Sensor Network) contains a gathering of remote sensor hubs that forma correspondence arranges. These hubs gather the touchy data from the area in addition to propel those substance as an information to the foundation location at which it checks the information as well as ID transferred by the hubs pertaining to sensor. These sensor hubs are typically low valued equipment segments with imperatives on reminiscence dimension as well as calculation abilities. The transportable WSNs are like WSN aside from to facilitate the hubs pertaining to sensor are portable in character. The different u tilizations of Mobile WSNs incorporate mechanical autonomy, transportation framework, reconnaissance, and following. Analysts center to incorporate Mobile WSNs into the (Internet of Things) IoT [10]. Nonetheless, an immense measure of safety problem emerges as assaults because of absence of equipment support and shaky sensor hubs. One such assault is the hub replication assault. In sensor systems, aggressors catch and trade off hubs to infuse fake information into the system that influence the system correspondence plus functions. Such kind of assault has been recognized as reproduction hub assault [11]. The foe catches mystery inputs as of the traded off hubs also distributes those in terms of reproductions in the system. Reproductions have been imitated as legit via the nearby hubs plus typical hubs dont know about imitations send signals such as its nearby hubs. It likewise connives and goes about as honest to goodness hub that gives immovability to the system. The copy hubs have been managed by the foe. The issue is the reproduction hubs likewise hold the input which has been needed for safe correspondence in the system. Notwithstanding these issues, versatility of hubs, the plot of imitation, and sideway assaults are the principle trouble while distinguishing plus managing those copy hubs. At the point when the reproductions are not distinguished, then the system will be interested in aggressors and the system turns out to be more powerless. The recognition of copy hub in the Mobile WSNs has been a significant undertaking. In this way, just few location plans are being suggested [12]. Since the enemy appropriates imitation hubs wherever in the system, the versatility helped recognition plan has been needed to distinguish the copies in the system. In the prior works, versatility helped system, (Single Hop Detection) SHD, was proposed. In Single Hop Detection, every hub communicates its area maintain to its solitary jump neighbors and chooses the witness hu b.[13] The chose witness hub recognizes reproductions by playing out the confirmation procedure. Subsequently, it lessens correspondence overhead. Notwithstanding, when the reproductions plot by means of every additional, they select imitation as an observer hub. Consequently, the recognition exactness has been less. The primary target pertaining to the suggested study has been to enhance the location exactness through the selection of the suitable witness hub with decreased overheads amid the discovery of copy hubs in the portable remote sensor systems. To congregate the goal, SHD is improved utilizing the AIS. Counterfeit Immune System (AIS) is a division of Artificial Intelligence in view of the standards of (HIS) Human Immune System. It gives different answers for this present reality issues because of its trademark highlights. The trademark highlights incorporate learning capacity to the novel circumstances, flexibility and dispersed personality to the various environment, rest ricted assets, as well as the ability to survive still in the brutal situations.[14] The upgrade of Single Hop Detection with AIS enhances the discovery precision. The commitment behind the research study tries to incorporate the upgrade of the SHD technique through application of the Clonal assortment calculation to select the observer hubs which has been a different commitment. Because of this, the discovery proportion is expanded through the selection of proper witness hubs and accordingly, the reproduction hub location handle causes least manage overheads. 2. MOTIVATION OF THE PROJECT Safety of Mobile WSNs is an indispensable test. One has been the hub replication assault, having a similar character of the caught hub, and the foe conveys an eccentric number of copies all through the system. Henceforth copy hub recognition is an imperative test With little exertion, a foe may catches, examinations, and repeats those of them as well as embed these copies at various areas inside the systems. Such assault may have a few results and may degenerate system information or critical divisions pertaining to the system. Existing strategies acquire manage overheads plus the discovery exactness has been little at which the copy is chosen in the form of an observer hub. The present study tries to suggest with regard to the improving of the SHD (Single Hop Detection) technique utilizing the Clonal assortment calculation to distinguish the duplicate through choosing the appropriate observer hubs. The benefits of the suggested strategy incorporate (i) increment in the identificatio n proportion, (ii) Decline in the management overhead, plus (iii) increment in throughput. The discovery rate likelihood alludes to location of the threat assault in a constrained era. The likelihood of recognition periods demonstrates that proposed technique distinguished the imitations in brisk, compelling and productive way. Something else, there could be a plausibility that an aggressor can exploit the late recognition to catch the entire correspondence. Vitality is likewise an essential parameter in reproduction location in light of the fact that an aggressor needs high vitality to screen the entire system. So also, the vitality of the portable hub ought to be effective to play out the recognition and alleviation handle for replication assaults. The likelihood of vitality that portable hub devours in the distribution plus getting messages by versatile hubs. The correspondence cost for discovery imitations ought to be attractive and high. Each versatile hub needs to amass the da ta, check and direct the examination for clones assaults identification (i.e., if similar hub character has been found). The recognition system ought to have high genuine optimistic speed (replica hubs are identified effectively) as well as the less untrue optimistic speed (typical hub is blamed as a replica). The execution of pertaining to the suggested study is measured utilizing identification proportion, false recognition proportion, parcel conveyance proportion, normal postponement, management overheads as well as throughput. The execution is done utilizing ns-2 to display the reality of the suggested study. 3. RELATED WORK The identification plans intended for still WSNs have not been material to MWSNs because of element system topology. An identification component in MWSNs should consider the portability of a hub with a specific end goal to distinguish copy [15]. The reproduction discovery instruments in MWSNs likewise stated in the writing are depicted underneath. The identification plans UTLSE (Unary-Time-Location Storage and Exchange) and MTLSD (Multi-Time-Location Storage and Diffusion) suggested [16] receive time-area guarantee approach. Every hub in Unary-Time-Location Storage and Exchange and Multi-Time-Location Storage and Diffusion saves various occurrences of time-area maintain of the followed hubs. With the gathering, of the time-area plans are traded flanked by two trackers to confirm the possibility of area cases. At the point when a contention emerges in the time-area confirmation procedure of a hub, it is distinguished as reproduction. A location conspire utilizing hubs pace has been su ggested [17]. The plan utilizes SPRT (Sequential Probability Ratio Test) to register hubs speed. At the point when a hub touches base at another area, it communicates now is the ideal time area state to the nearby hubs. Neighbors forward the got maintain to BS following effectively confirming the realness of the communication. The BS is in charge of social event time-area cases of the hubs plus evaluates their speed. A hub possessing the pace that is greater when compared to it has already defined with a pace cutoff is identified as reproduction through the BS. A pair wise key foundation procedure to recognize presence of reproduction is displayed [18]. The aggregate quantity pertaining to the pairwise keys set up by a hub is put away utilizing Counting Bloom channel. The tally of total keys in numbers built up is intermittently transferred to the BS viaevery hub. The got Counting Bloom channels are redesigned at BS for every hub in the system. At the point when the quantity of keys built up for a hub surpasses the predefined edge esteem, the hub is distinguished as copy by the BS. A solitary bounce based reproduction location plan has been suggested [19]. In the present work of the researchers, the observershub determination strategy for single-bounce imitation discovery is enhanced by utilizing clonal choice calculation. The best reasonable observer for a hub in its single-bounce neighbor is chosen utilizing the clonal choice calculation. The area unique finger impression sharing and confirmation strategy is utilized to recognize reproduction. The (Extremely Efficient Detection) XED plus EDD (Efficient Distributed Detection) plans have been suggested [20]. The recognition of copy in XED is based upon the trading of an irregular number between every combine of hubs, which is additionally called a test. At the point when a similar match of hubs gets together at a later purpose pertaining to the time, the test check has been executed. A hub that comes up short the test check process is recognized as a reproduction. In the Efficient Distributed Detection, a reproduction is identified in light of the tally pertaining to the quantity of gatherings between a couple of hubs. In the event that the quantity of gatherings of a hub over a period interim surpasses the predefined edge, after that it is recognized as copy. In the identification plans, the imitations are recognized through the BS. In these plans, BS is overloaded with calculation and reproduction discovery undertakings. There is likewise an extra in the clouds within the system for imparting between every one of the hubs and the BS. The XED component is not versatile to taking of test from a caught hub. In EDD plot, the execution of identification component relies on upon the quantity of gatherings edge, which is hard to assess in MWSNs. This has been on the grounds that the quantity of gatherings with a hub over a period interim relies on upon the system measure, the range of organiz ation, hubs pace, plus the versatility replica of the hubs. It alters with the variety of some of these constraints in the system. For instance, if the system size is expanded, then the quantity of gatherings with a specific hub diminishes, as prob 1/arrange measure. Assessing an edge upon the quantity of gatherings with a hub in the absence of taking into consideration the variety of the previously mentioned parameters may bring about false recognition. In the plan suggested [21], the imitation is recognized exclusively in light of a solitary instance of contention with the deliberate pace. The pace is registered utilizing the Euclidean separation between reported areas of a hub over a period interim. This might not register the real pace of a hub in the system with irregular waypoint portability demonstrate. At the point when a hub moves quicker by altering the course as often as possible, it never takes after a straight way. In addition, since the areas of copy and the first hub are utilized to gauge the straying velocity, the enemy may convey the reproductions to draw inside nearer buildings of the first hub to maintain the deliberate speed inside the acknowledged assortment. In the plan suggested , the area unique mark system is not reasonable for MWSN, because of the lively topography of the system. Also, choice of a solitary witness hub may prompt to low imitation recognition likelihood, at which the nearby hubs are every now and again changing after some time. The copy discovery process ought not choose in light of one time clashing conduct of a hub and its imitation while utilizing the parameters, for example, pace as well as the quantity of gatherings, yet rather conduct ought to be seen over various time interims display the (XED) eXtremely Efficienty Detection technique. This is an appropriated recognition calculation for versatile systems where the discovery depends upon the information traded between the hubs in the system. It recognizes the rep roduction in view of the arbitrary number traded among one another pertaining to the two hubs. The recognition capacity is debased when the copies trade the correct arbitrary esteem. [22] Suggested SHD (Single Hop Detection) technique. It is a versatility helped based ispersed recognition technique. In SHD technique, when a hub shows up at various neighborhood group, imitation is identified. This strategy enhances the correspondence overhead. 4. PROPOSED WORK The suggested upgraded SHD technique makes utilization of the Clonal determination calculation for the improvement. The improved SHD is like SHD with the exception of that the choice of witness hubs is finished through the Clonal assortment calculation. The suggested CSSHD like SHD comprises of unique mark claim and unique finger impression check stages. In the unique mark assert stage, the unique finger impression of the hubs neighbors is traded between the one-jump neighborhoods. The determination of witness hub is based upon the choice of lymphocytes at large in the Clonal collection calculation. The hub which has been most extreme capacity to forward information is chosen as witness hub. The greatest capacity of the observer hub is dictated by its sending ability. The sending capacity is controlled through the faith estimation of the hub. The trust esteem is ascertained in view of the information bundle sending proportion (DFR) as well as the manage parcel sending proportion (PFR ). The suggested CSSHD strategy aids in choosing the suitable witness hub. Consequently, the recognition exactness can be enhanced by distinguishing the copies with least control overheads. Amid experimentation, the attributes of every hub in the system and its execution are investigated utilizing the suggested CSSHD technique. The proposed philosophy is tried utilizing NS-2 test system, which is basic and surely understood system test system apparatus. The adaptation pertaining to NS-2 has been ns-This device is for the most part utilized as a part of the recreation region of MANET, remote sensor system, VANET, et cetera. Amid the reproduction time, the insights are gathered. The insights incorporates information parcels got, control bundles created, sent parcels, aggregate of all parcels delay, add up to number of got bundles, add up to number of reproduction hubs accurately discovered, add up to bytes got every second and aggregate quantity of kilobytes. Utilizing the above measu rements, the accompanying measurements are characterized: (i) Packet conveyance proportion, (ii) Control overhead, (iii) Standard postponement, (iv) Communication fall (v) Throughput, (vi) Discovery proportion, (vii) False caution rate, The execution pertaining to the suggested strategy is assessed as far as the given factors. The suggested study tries to improve its execution in every one of the measurements; especially, the discovery proportion is enhanced much superior to the current technique. 5. CONCLUSION In versatile WSN, hub replication assault is an essential one. The different reproduction recognition techniques are data traded based identification, hub meeting based location, and the portability based discovery. Of all the above mentioned three copy recognition techniques, the suggested study focuses on the versatility helped based location strategy.. The planned study upgrades the SHD strategy utilizing Clonal Selection calculation of AIS to enhance the recognition proportion through the choice of the good eyewitness hub. The suggested CSSHD strategy is utilized as a part of a completely appropriated environment where correspondence happens among single jump neighbors, exceedingly solid against hub plot and effective in securing against different copy hubs. The test is directed utilizing the ns-2 test system. The proposed technique is being great throughput, little above head and less untrue caution rate. The aftereffects pertaining to the suggested approach are contrasted and e xisting technique which demonstrates that the normal deferral, manage in the clouds, and communication drop have been minimized with higher bundle conveyance ortion esteem and higher recognition proportion. This demonstrates the proposed technique is proficient towards identifying duplicates which have been not flexible against deceitful reproductions with least control REFERENCE M. Carlos-Mancilla, E. LÂÂ ´opez-Mellado, and M. Siller (2016) , Wireless sensor networks formation: approaches and techniques, Journal of Sensors, vol. 2016,Article ID 2081902, 18 pages. S. Tanwar, N. Kumar, and J. J. P. C. Rodrigues (2015.) , A systematic review on heterogeneous routing protocols for wireless sensor network, Journal of Network and Computer Applications, vol. 53, pp. 39-56. A. Hadjidj, M. Souil, A. Bouabdallah, Y. Challal, and H. Owen (2013) , Wireless sensor networks for rehabilitation applications: challenges and opportunities, Journal of Network and Computer Applications, vol. 36, no. 1, pp. 1-15. K. Sohraby, D. Minoli, and T. Znati (2007) , Wireless Sensor Networks Technology, Protocols, and Applications , John Wiley Sons ,New York, NY, USA. J. Rezazadeh, M. Moradi, and S. A. Ismail (2012) , Mobile wireless sensor networks overview, International Journal of Computer Communications and Networks, vol. 2, no. 1, pp. 17-22. I. Amundson and X. D. Koutsoukos (2009) , A survey on localization for mobile wireless sensor networks, in Mobile Entity Localization and Tracking in GPS-less Environnments: Second International Workshop, MELT , Orlando, FL, USA, September 30, 2009. Proceedings, vol. 5801 of Lecture Notes in Computer Science, pp. 235-254, Springer, Berlin, Germany. Y. Yu, K. Li, W. Zhou, and P. Li (2012) , Trust mechanisms in wireless sensor networks: attack analysis and countermeasures, Journal of Network and Computer Applications, vol. 35, no. 3, pp. 867-880. C. Zhu, L. Shu, T. Hara, L.Wang, S. Nishio, and L. T. Yang (2011) , A survey on communication and data management issues in mobile sensor networks, Wireless Communications and Mobile Computing, vol. 12, no. 16, pp. 1-18. S. Md Zin, N. Badrul Anuar, M. Laiha Mat Kiah, and A.-S. Khan Pathan (2014), Routing protocol design for secureWSN: review and open research issues, Journal of Network and Computer Applications, vol. 41, no. 1, pp. 517-530. C. P. Mayer (2009) , Security and privacy challenges in the internet of things, Electronic Communications of the EASST, vol. 17, pp. 1- 12. B. Parno, A. Perrig, and V. D. Gligor (2005) , Distributed detection of node replication attacks in sensor networks, in Proceedings of the IEEE Symposium on Security and Privacy, pp. 49-63, IEEE, May. J.-W.Ho, D. Liu, M. Wright, and S. K. Das (2009), Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks, Ad Hoc Networks, vol. 7, no. 8, pp. 1476-1488. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo (2013) , Localized algorithms for detection of node replication attacks in mobile sensor networks, IEEE Transactions on Information Forensics and Security, vol. 8, no. 5, pp. 754-768. B. Zhu, V. G. K. Addada, S. Setia, S. Jajodia, and S. Roy (2007) , Efficient distributed detection of node replication attacks in sensor networks, in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 07), pp. 257-266, IEEE, Miami Beach, Fla, USA, December. J.-W. Ho, M. Wright, and S. K. Das (2011) , Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing, IEEE Transactions on Mobile Computing, vol. 10, no. 6, pp. 767-782. X. Deng, Y. Xiong, and D. Chen (2010) , Mobility-assisted detection of the replication attacks in mobile wireless sensor networks, in Proceedings of the 6th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 10), pp. 225-232, October. H. R. Shaukat, F. Hashim, A. Sali, and M. F. Abdul Rasid (2014) , Node replication attacks in mobile wireless sensor network: a survey, International Journal of Distributed Sensor Networks, vol. 10, no. 12, Article ID 402541, pp. 1-15. X.-M. Deng and Y. Xiong (2011), A new protocol for the detection of node replication attacks in mobile wireless sensor networks, Journal of Computer Science and Technology, vol. 26, no. 4, pp. 732-743. L. S. Sindhuja and G. Padmavathi (2016) , Replica node detection using enhanced single hop detection with clonal selection algorithm in mobile wireless sensor networks, Journal of Computer Networks and Communications, vol. 2016,Article ID 1620343, 13 pages. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo (2008), Mobile sensor network resilient against node replication attacks, in Proceedings of the 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 08), pp. 597-599, San Francisco, Calif, USA, June. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo (2013) , Localized algorithms for detection of node replication attacks in mobile sensor networks, IEEE Transactions on Information Forensics and Security, vol. 8, no. 5, pp. 754-768. Y. Lou, Y. Zhang, and S. Liu (2012) , Single hop detection of node clone attacks inmobilewireless sensor networks, in Proceedings of the International Workshop on Information and Electronics Engineering (IWIEE 12), pp. 2798-2803, Harbin, China, March.

Friday, October 25, 2019

Interview Essay - Murray Meisels -- Interview Essays

Interview Essay - Murray Meisels Murray Meisels was born on April 19, 1924, in Brooklyn, New York. He grew up in New York City and came to California in 1941 to attend college at USC. After graduating from USC, he attended the University of Oregon Dental School and the University of Buffalo Dental School. Murray served in the military during WWII and the Korean War. In 1948, he married Francis and they made their home in Buffalo, New York. They raised two children, and Murray owned a dental practice for over 40 years. While raising a family and practicing dentistry, he completed a Masters degree and taught at the University of Buffalo Dental School. In 1991 Murray retired from private practice, but continued teaching part time at the dental school. During this time he and his wife spent winters in California. In 1996 they decided to make California their permanent home, and are very happy living here. They are proud parents and grandparents. Murray is very active and enjoys the Emeritus program, exercising regularly , stamp collecting, golf and craft works. He creates beautiful ceramic, glass and sculptured pieces. The key elements in Murray's definition of happiness are peace, quiet, a lack of arguing, good health, and security. His definition of happiness has changed through the years, and he finds himself content with allowing people and situations to be the way they are. He is happier when he doesn't let things bother him. He has learned over time not to worry and aggravate himself unnecessarily. Selfish and opinionated people used to bother him terribly and he felt the need to respond, argue, or simply avoid them. But now he can handle these types of situations without feeling stressed. Having too many requests at h... ...w and you'll see the results in your life." He feels that this advice is consistent with his philosophy on life. "I try to be fair and honest with everyone, sometimes to a fault. I like people to be honest and fair with me. I have always loved and done right by my family. I worked hard to do the best job that I could and I didn't take advantage of anyone in my practice." I truly enjoyed my time spent with Murray. Both he and his wife Francis graciously welcomed us into their home, and made us feel like familiar friends. It was wonderful to hear him share stories from his life and I thank him for his openness and honesty. His insights about the trials and tribulations of life were applicable to a person of any age. Many times over the last few weeks, I have found myself thinking about something that he said. Murray is truly full of life and has a lot of spirit! Interview Essay - Murray Meisels -- Interview Essays Interview Essay - Murray Meisels Murray Meisels was born on April 19, 1924, in Brooklyn, New York. He grew up in New York City and came to California in 1941 to attend college at USC. After graduating from USC, he attended the University of Oregon Dental School and the University of Buffalo Dental School. Murray served in the military during WWII and the Korean War. In 1948, he married Francis and they made their home in Buffalo, New York. They raised two children, and Murray owned a dental practice for over 40 years. While raising a family and practicing dentistry, he completed a Masters degree and taught at the University of Buffalo Dental School. In 1991 Murray retired from private practice, but continued teaching part time at the dental school. During this time he and his wife spent winters in California. In 1996 they decided to make California their permanent home, and are very happy living here. They are proud parents and grandparents. Murray is very active and enjoys the Emeritus program, exercising regularly , stamp collecting, golf and craft works. He creates beautiful ceramic, glass and sculptured pieces. The key elements in Murray's definition of happiness are peace, quiet, a lack of arguing, good health, and security. His definition of happiness has changed through the years, and he finds himself content with allowing people and situations to be the way they are. He is happier when he doesn't let things bother him. He has learned over time not to worry and aggravate himself unnecessarily. Selfish and opinionated people used to bother him terribly and he felt the need to respond, argue, or simply avoid them. But now he can handle these types of situations without feeling stressed. Having too many requests at h... ...w and you'll see the results in your life." He feels that this advice is consistent with his philosophy on life. "I try to be fair and honest with everyone, sometimes to a fault. I like people to be honest and fair with me. I have always loved and done right by my family. I worked hard to do the best job that I could and I didn't take advantage of anyone in my practice." I truly enjoyed my time spent with Murray. Both he and his wife Francis graciously welcomed us into their home, and made us feel like familiar friends. It was wonderful to hear him share stories from his life and I thank him for his openness and honesty. His insights about the trials and tribulations of life were applicable to a person of any age. Many times over the last few weeks, I have found myself thinking about something that he said. Murray is truly full of life and has a lot of spirit!

Thursday, October 24, 2019

Needs Analysis Essay

Majority of students lack understanding of mathematical language and show weakness in basic numerical computation. The students make frequent errors because they misread operation signs when adding or subtracting integers or carry numbers incorrectly when multiplying whole number and decimals. Furthermore, these students have difficulty understanding written or verbal directions or explanations, and find word problems especially difficult to translate. Current Conditions The current data shows that only 15 percent of the students were able to understand and perform the necessary computation with minimal errors on application problems to pass the semester exam with a 70 or above. Thus 85 percent were unsuccessful on the semester exam that focus on computation skills and understanding application word problems. Desired Conditions The optimal goal is to increase the student’s performance from its current state by 200 percent. By increasing the student’s performance, the students should be able to understand, define, and use mathematical terminology to solve difficult application problems without minimal computation errors. Data Collection Processes Discussion of Data Collection Instruments Used In order to determine what problems students had in school and what tools math teachers thought students should emphasize, interviews and focus groups were used due to the speed of receiving the results. Test score data was gathered from the district as it was already mandated by the district and results were already given. Test scores and the data retrieved from the district is meant to be similar to the state assessment that will be given towards the end of the 5th six weeks. Discussion of Sources of Data Surveys and other short interviews were given to the 6th, 7th, and 8th grade math teachers at the middle school campus. It is believed that it is partially due the lack of reviewing their own work is a potential source of the low test scores. Survey question was introduced by creating a baseline of how often teachers believed students should be checking their work. By first understanding this, it would allow a determination if there was in fact a difference between students’ actual reviewing patterns and the actual reviewing patterns. Additionally, an issue with reviewing would be if students are unfamiliar with how to check their work. By determining which skills the teachers deem to be the most productive when practicing their computation, the teachers will then be able to create a vertical alignment where instruction is built on those review skills. This would provide students with a foundation where their knowledge can be increased without the troubles of having to learn a new way to review. Typically the reverse operation would be done in order to check for the correct answer. However, if there is an issue in the basic computation it would hinder students being able to check their work. This was the reason why students were also given survey questions and were interviewed. Students would be asked how often they check their work and they would also identify their self-efficacy in computation of problems with decimals. If there is a need in that students do not check their work and if they do not feel competent in completing the problems with decimals, then it would dictate a need to reteach the material. Surveys and interviews were given to students due to their speed and their ability to quickly assess where a need was. Data Analysis Techniques Used The first survey question asked the students about the percentage of the time they reviewed their work after completing a math problem. The answer choices included: between 0-20 percent, between 20-40 percent, between 40-60 percent, between 60-80 percent, and between 80-100 percent.

Wednesday, October 23, 2019

An Evaluation of the Effectiveness of Premiums Promotion, Limited

Qing Lu 2111573 10 weeks Business M. Sc. International Business Permission given to use this project Word Count: 2824 An Evaluation of the Effectiveness of Premiums Promotion, Limited- time Discount and Loyalty Card Promotion—Based on Product Life Cycle 31 August 2012 Abstract In recent years, sales promotion tactics are extensively used to achieve different marketing targets.The aim of this project is to analyze the effectiveness of premiums promotion, limited-time discount and loyalty card promotion according to the marketing targets in the first three phases of product life cycle, which can help companies maximize the effects of sales promotion. The specific marketing targets in the first three stages of product life cycle are discussed and the effective sales promotion tactics are analyzed, based on a rich literature about sales promotion.The potential risks in the implementation process need to be taken into account and the possible solutions are proposed to help companie s reduce the unnecessary losses. This may be of interest to marketers, which intend to enhance the competitiveness of companies.   List of references Introduction As the competitive pressure on market increases, the studies on product life cycle are paid more and more attention by marketers in recent years. On one hand, product life cycle can direct companies to set the clear marketing target in each phase. On the other hand, it can help marketers select the effective sales promotion tactics to achieve each marketing target.The selection of sales promotion strategies in each stage of product life cycle seems to be of considerable importance in achieving different marketing targets. The study by Yeshin (2006) suggests that premiums promotion, limited-time discount and loyalty card promotion play marked roles in the first three stages of product. Moreover, it appears to be necessary for marketers to set the marketing targets in different stages of product life cycle, to select the e ffective means of sales promotion, and to be aware of possible solutions for dealing with potential risks.As Kotler and Armstrong (2001) point out, companies can induce customers to know, to use and to be loyal for their products by the effective means of sales promotion, even if customers may have different buying habits, product preference and purchase motivation. The purpose of this paper is to analyze the effectiveness of premiums promotion, limited-time promotion and loyalty card promotion according to the three marketing targets in the first three phases of product life cycles, which tends to help companies expand new product awareness, increase market share and maintain customer loyalty. Features nd marketing targets of the first three stages of product life cycle will first be presented. The reasons for the effectiveness of the three marketing tactics mentioned above will then be analyzed, with a focus on the three corresponding marketing targets. The limitations and the pos sible solutions will finally be discussed to help firms reduce the potential risks. 1. Features and Marketing Targets of Product Life Cycle When a new product is launched into market, it will go through four stages of product life cycle, which are introduction, growth, maturity, and decline (Kotler and Armstrong 2001).The first three stages, however, may be the optimal period at which the effect of sales promotion can be maximized. Therefore, features of the first three stages and the corresponding marketing targets will be discussed in the following subsections. 1. 1 Introduction stage Introduction stage refers to a period at which new products are first introduced into market (Ibid). In this phase, the growth of sales tends to be slow because much time and money need to be invested to attract the resellers, to inform customers of new products, and to encourage the trial (Ibid).In other words, customer demand for new products should be aroused in the introduction stage. As Bhasin ( 2011) points out, marketers should induce customers to accept new products, thus inspiriting their desires for these products. As a result, the marketing target in introduction stage appears to maximize new products awareness and to stimulate customers to try out new products. 1. 2 Growth stage Growth stage refers to a period at which new products are widely recognized in the market, and more and more customers are willing to follow their innovators (Kotler and Armstrong 2001).The market share is likely to be quickly expanded in this stage as long as marketers attempt to form a purchasing trend. According to the illustration by Bhasin (2011), growth stage offers the appropriate opportunity to markers to occupy more market share due to the high growth rate of sales. Hence, the marketing target in this phase should be to quickly boost sales volume, so as to create a customer trend that more new customers could be attracted to follow. 1. 3 Maturity stageIt is widely agreed that sales i n the maturity stage continue to grow at a relatively slow rate until it reaches the peak, which means the number of customers seems to maintain relatively stable (Kotler and Armstrong 2001, Janotta 2012). There is far less agreement, however, about customers’ purchasing behaviors in this phase. Yeshin (2006) concludes that it may be a competitive period in which the existing customers are likely to buy other brands. In fact, competitive products are likely to flood into the marketplace in the maturity stage, providing more options for customers.Thus, if the effective measures are not taken, companies would lose a portion of market share. Likewise, Bhasin (2011) also illustrates that fierce market competition probably occurs in the maturity stage because some competitors tend to drive down the prices under the cost, in order to draw the attention of customers. Namely, the risk of brand switching in this phase seems to be high, so the marketing target should be set to retain c ustomer loyalty.In conclusion, the first three stages of product life cycle have their own features, so different marketing targets need to be set in different phases: new products awareness should be expanded in the introduction stage, sales volume should be quickly boosted in the growth stage, and customer loyalty should be maintained in the maturity stage. Then, effective sales promotion tactics will be analyzed in the next chapter, according to the marketing targets in the three phases. 2. Analysis of the Three Sales Promotion Tactics 2. 1 Premiums promotion for new product awarenessPremiums promotion refers to free products or free services that can be obtained by customers in addition to the main purchase (Yeshin 2006). Gift promotion plays an important role in new product introduction. First of all, free gifts as incentives can encourage customers to try out new products as well as inform customers about new demand. For example, 200,000 Quattro for Women razors were given out as free gifts in American by Schick, which allowed Quattro to receive the recognition of most female customers (Pride and Ferrell, 2010).It seems that free gifts are effective to stimulate customers to generate interest in new products. Yeshin (2006), however, argues that premiums promotion may reduce the value of brand due to the possible hazard caused by the free gifts in the product contents. For example, in order to attract children, small toys are often inserted into snakes as premiums, which are likely to arouse the controversy about food security, thereby resulting in brand crises. Nevertheless, premiums still contribute to expand new products awareness.Pride and Ferrell (2010) illustrates that the Promotion Marketing Association’s Product Sampling Council, according to an investigation, showed that 92%of participators in this survey indicated that free samples motivated their trials for new products. Besides, the free experience as a kind of intangible gifts could al low customers experience multi-value such as relational, emotional and behavioral value, which increases brand popularity and affinity. As a case in point, the customers who buy the new item in Burger King could watch the latest Star Wars film for free (Yeshin 2006).Not only did the famous film expand the new item awareness, but also increased customers’ affection for Burger King. In fact, the reason why premiums promotion has a great appeal to customers tends to be that it gets hold of customers’ mentalities. According to the study by Yeshin (2006), customers usually get used to regarding themselves as the weaker end of the deal, so the free products or services as the compensatory gifts can incentivize customers. Consequently, premiums as incentives can benefit to expand new products awareness in the introduction stage. 2. 2 Limited-time promotion for quick boost to salesA promotional deadline is set for customers to ensure that the volume of sales can be boosted as soon as possible, which is called limited-time promotion (Reid and Bojanic 2010). The advantage of limited-time discount lies in a short-term surge in sales, which enables companies to rapidly grab market share in the growth phase. Limited-time discount seems to create a sense of excitement and competition and a tense atmosphere. Customers tend to be attracted by excitement that limited-time discount create. Or rather, what customers love may not be products themselves but the sense of getting a good deal.Kolb (2005) also indicates that even the customers with high wages like to feel that they are smart in this way. In addition, as this kind of discount is temporary, which will restore regular prices soon, it creates a threat to customers, aiming at stimulating them to make immediate purchase (Gaffney and Francis, 2009). Such a threat appears to take effect on rapidly increasing sales. According to Reid and Bojanic (2010), Marriott International, Hyatt Hotels and Resorts, and Hilton gave discounts to customers on weekends as so to quickly boost the volume of sale, which had gotten great success.Hence, if limited-time discount is used in the growth stage, market share can be quickly expanded by increasing sales in the short term. 2. 3 Loyalty card for customer loyalty Loyalty card is used to earn points for purchasing certain products or shopping at certain retailers. When customers collect enough points, these can be exchanged for money, goods or other offers (Kotler and Armstrong 2001). One of the main functions of loyalty card is to maintain the long-term relationship between customers and brands. It motivates customers to keep buying products with fixed brand, thus strengthening customers’ brand loyalty.A study by Lancaster and Massingham (2011) shows that Tesco owed its success in becoming the largest grocery supermarket retailer in Britain to introduction of loyalty card, since loyalty card was used to reward regular purchase, thus enhancing consum er loyalty to Tesco. Furthermore, loyalty card is felt to be effective in analyzing purchasing behaviors of the existing customers and directing enterprises to improve the operation of businesses, which thus benefits to build long-lasting relationship with existing customers.As Humby, Hunt and Phillips (2007) conclude, shopping habits, brand preference and economic capability of certain customer groups can be analyzed through loyalty card data, which contribute to firms to adjust marketing strategy. As a matter of fact, most marketers concern about customer loyalty in the maturity stage in that many competitive brands have piled into the market, which may lead customers to switch other brands.Liljenwall(2004) points out that it is difficult to be loyal for most products that customers purchase, even though many of them have brand preference for commodities. Indeed, they attempt to seek the best one by constantly changing brands. However, it seems that loyalty card reduces the risks of brand switching by offering discounts for regular purchases. When facing to different brands with same quality, customers usually would like to purchase fixed brand in return for discount. That is to say, loyalty card promotion can effectively maintain customer loyalty in the maturity stage.In conclusion, the three sales promotion tactics are effectively used to help companies to achieve the marketing targets in different phases: premiums promotion expands new products awareness in the introduction stage since this way could induce consumers to try out new items; limited-time promotion probably helps companies increase market share in the growth stage through boosting the volume of sales as soon as possible; loyalty card seems to be effective to maintain customer loyalty in the maturity stage because marketers would like to provide discount or gifts in return for regular purchase.Nonetheless, some potential risks may occur in the implementation. In order to maximize the effects o f sales promotion on different phases of product life cycle, limitations and possible solutions of the three means of sales promotion will be discussed in the next main section. 3. Limitations and Possible Solutions 3. 1 Risks of premiums promotion There seems to be two limitations in premiums promotion. First, it is difficult for marketers to ensure that premiums or free samples are attractive enough to their target customers (Ace 2002).In the introduction stage, new products usually need to be widely aware, so if premiums cannot arouse customers’ interest, marketers may lose chances to convince customers to try out their new products. Second, the cost of premiums and the value that customers perceive should be balanced. As Yeshin (2006) illustrates, the low-cost premiums may be perceived as low quality, thus reducing the brand value of new products themselves, whereas free gifts with high quality often cost much.Hence, it is felt to be difficult for marketers to forecast th e perceived value of premiums and to ensure that premiums can enhance new products reputation. 3. 2 Risks of limited-time discount Two possible limitations should be taken into account when limited-time discount is implemented. First, overusing limited-time discount probably shakes consumers’ decision for instant purchase in that they get used to waiting for discounts (Hendershot-Hurd 2007). As most customers are waiting for discount, it seems possible that the growth rate of sales becomes low in the growth stage.Second, if the time interval between the end of a limited-time discount and the start of the next limited-time discount is short, the perceived value of products may be reduced (Devlin, Ennew, McKechnie, and Smith 2007). In other words, Customers may regard the promotional price as the actual value. As a result, once restoring the original price, products may become unacceptable. 3. 3 Risks of loyalty card promotion The security of personal data caused by loyalty car ds may lead to customer dissatisfaction (Janotta 2012).For example, customers probably regard loyalty cards as source of spamming, thereby refusing to use loyalty card; they may also feel that individual privacy is offended, which could directly decrease customer satisfaction and destroy customer loyalty; if rewards cannot satisfy customers, they are likely to lose interest in loyalty card. As Janotta (2012) concludes, loyalty card system often disappoints consumers because of unattractive rewards, harsh requirements for exchange, and time and place limit. 3. 4 Possible solutionsWith regard to the limitations above, the possible solutions are proposed by Yeshin (2006) and Kotler and Armstrong (2001) as follow: * A small quantity of premiums should be first used at the beginning of introduction stage for market test, and a mass of premiums or free samples should be then used to expand new products popularity. * Time limited discount should be reasonably used and the promotion cycle s hould be identified by market investigation * Integrated promotion replacing single promotion should be used to stimulate customers in the first three stages of product life cycle.These possible solutions enable companies to reduce the risks in the implementation, thereby avoiding the unnecessary losses. All in all, the risks of sales promotions should be considered by marketers. First, low attractiveness and low perceived value of premiums could reduce the interest of customers in new products. Second, overuse and short cycle of limited-time promotion tend to compel companies to cut prices in that customers may overly relay on discount and reject to purchase at the original price.Third, the invasion of privacy caused by loyalty cards can result in decreasing customer satisfaction since customers could feel to be offended. Furthermore, in terms of possible solutions, early market test on a small scale enables companies to adjust promotion strategies, appropriate promotion cycle prob ably stimulate customers to make instant purchase decision, and integrated promotion mode could make better use of the advantages of sales promotion and compensate for the disadvantages of each other. Conclusion Sales promotion tactics seems to be of considerable importance in achieving different marketing targets.This paper analyzed the effectiveness of three sales promotion tactics according to the three marketing targets mentioned above. First, premiums could encourage customers to try out new products, which are beneficial to expand new products popularity in the introduction stage. Second, limited-time promotion is used to increase sales as sons as possible, eventually occupying more market share in the growth stage. Third, loyalty card has great advantage in keeping long-term relationship with existing customers, which could reduce the risk of brand switching in the maturity stage by rewarding regular purchase.Nevertheless, it seems to be inevitable that the three sales promot ion strategies have limitations. First of all, the quality and attractiveness of free gifts may directly influence the perceived values of new products. Furthermore, limited-time discount may stop products from restoring the original prices since customers prefer to wait for discounting. Finally, even if companies may obtain useful information about customers through analyses of loyalty card data, customer satisfaction is probably reduced due to the invasion of individual privacy.The possible solutions can be summarized as market test on a small scale, appropriate promotion cycle, and integrated promotion mode, which could reduce the risks above and maximize the effects of sales promotion. In discussing process in premiums promotion, limited-time discount and loyalty card promotion, it was conclude that the three tactics of promotion can be effective to help companies achieve the marketing targets in the first three phases, based on a rich literature about sales promotion.However, i t should be noted that a detailed analysis of other tactics of sales promotion realizing different marketing targets is not involved in this paper and future work could be done in this area. This would mainly focus on online marketing and could help marketers enhance the competitiveness of online marketing by appropriate strategies of sales promotion.References Ace, C. (2002) Effective Promotional Planning for e-Business. Oxford: Butterworth-Heinemann Devlin, J. , Ennew, C. ,McKechnie, S. , and Smith, A. (2007) ‘A study of time limited price promotions’. Journal of Product & Brand Management 16 (4), 280 – 285 Gaffney, S. and Francis, C. (2009) Honesty Sells: How to Make More Money and Increase Business Profits. Hoboken: John Wiley & Sons Humby, C. , Hunt, T. , and Phillips, T. (2007) Scoring Points: How Tesco Continues to Win Customer Loyalty. London: Kogan Page Hendershot-Hurd, K. (2007) Beyond the Niche: Essential Tools You Need to Create Marketing Mess ages that  Deliver Results. Swindon: Acuminate Janotta, S. (2012) Loyalty Cards in the Apparel Retail Industry. Munich: Grin Verlag Kolb, B. M. (2005) Marketing for Cultural Organizations. London: Thomson Learning Kotler, P. and Armstrong, G. (2001) Principles of Marketing. Upper Saddle River: Prentice Hall Lancaster, G. and Massingham, L. (2011) Essentials of MarketingManagement. Abingdon: Routledge Liljenwall, R. (2004) The Power of Point-of-Purchase Advertising: Marketing At Retail. Washington, DC: Point-Of-Purchase Advertising International   Pride, W. M. and Ferrell, O. C. (2010) Marketing. Stamford: Cengage Learning Reid, R. , D. and Bojanic, D. , C. (2010) Hospitality Marketing Management. Hoboken: John Wiley & Sons Yeshin, T. (2006) Sales Promotion. London: Thomson Learning