Sunday, January 26, 2020

Conventional Sensors and Optical Fiber Sensors

Conventional Sensors and Optical Fiber Sensors ABSTRACT This study deals with the comparison of the two types of sensors which are widely used in civil engineering, namely, conventional sensors and optical fiber sensors. Temperature and displacement are the two principal parameters which are measured with the aid of Fiber optic sensors. Bragg Grating, Interferometric, Intensity Sensors, and optical time domain reflectometry (OTDR) are some of the techniques which are used for sensing. In this study, various case studies have been undertaken and have been analyzed. With the aid of these case studies, a detailed analysis and comparison of the sensors is carried out. Chapter 1: INTRODUCTION In the last two decades, the world has witnessed a revolution in the sectors of optoelectronics and fiber optic communications. Various products such as laser printers and bar code scanners which have become a part of our daily usage, are a result of this technical revolution only. The reasons for the phenomenal growth of the fiber optics are many. The most conspicuous reason being the ability of the fiber optics to provide high performance and highly reliable communication links and that too at a very low bandwidth cost. As we see that optoelectronic and fiber communications industry has progressed a lot, and along with these industries fiber optic sensors have also benefited a lot from these developments. Due to the mass production in these industries, availability of fiber optic sensors at a low cost has been made possible in recent years. With their availability at affordable costs, fiber optic sensors have been able to enter the domain which was otherwise being ruled by the trad itional sensors. In recent years, the demand for the development of new materials to strengthen, upgrade and retrofit existing aged and deteriorated concrete structures has increased rapidly. The continuing deterioration and functional deficiency of existing civil infrastructure elements represents one of the most significance challenges facing the worlds construction and civil engineers. Deficiencies in existing concrete structures caused by initial flawed design due to insufficient detailing at the time of construction, aggressive chemical attacks and ageing of structural elements enhance an urgent need of finding an effective means to improve the performance of these structures without additionally increasing the overall weight, maintenance cost and time. In the last 50 years, a large number of civil concrete structures have been built; many of these structures, particularly in off-shore regions have now deteriorated and require repair in a short period of time. Moreover, the increase of traffic volume and population in many developing countries is causing the demand to upgrade existing concrete structures to increase. The damage of reinforced concrete (RC) structures through reinforcement corrosion and residual capacity are the most important issues that concern engineers. These problems occur not only in constructed concrete structures but also in structures strengthened by externally bonded steel reinforcements. In the past, the external steel plate bonding method has been used to improve strength in the tensile region of concrete structures with an epoxy adhesive and has proved to be successful over a period of 20 years. However, the use of steel reinforced plates and bars has its disadvantages including high corrosion rates, which could adversely affect the bond strength and cause surface spalling of the concrete, due to volumetric change in the corroded steel reinforcements. Since the early 1980s, fibre-reinforced plastic (FRP) materials have been used as a replacement for conventional steel materials for concrete strengthening applications. In recent years, the interest in utilizing FRP materials in the civil concrete industry in forms of rods, plates, grid and jacket has grown increasingly. When an FRP plate with high tensile strength properties bonds on the concrete surface, it can strengthen the structure with minimum changes to its weight and dimensions. FRP offers substantial improvement in solving many practical problems that conventional materials cannot solve to provide a satisfactory service life of the structure. Unlike the conventional steel materials, FRP is corrosion resistant. The beneficial characteristics of using the FRP in concrete construction include its high strength-to-weight ratio, low labour requirement, ease of application, reduced traffic interruption during repair, cost reductions in both transportation and in situ maintenance for a long-term strategy. Its high damping characteristic also attracts more structural engineers to use these materials for seismic retrofitting. Due to the increasing use of FRP-plate bonding techniques in strengthening civil concrete structures, the interest in finding a suitable means of monitoring the structural health conditions of these strengthened structures has therefore increased substantially. Since strengthened structures are covered by the FRP plates, the mechani cal properties of the concrete may not be measured or detected easily through conventional nondestructive evaluation (NDE) methods, such as strain measurements using surface mounted strain gauges or extensometers, radiography, thermography and acoustic emission methods, particularly in areas with microcracks and debonds underneath the externally-bonded plate. Besides, these structural inspection technologies, in certain cases, require special surface preparations or a high degree of flatness in the concrete surface. These requirements may be hard to achieve, particularly for an area that is exposed to a harsh environment. During the 1990s, a multi-disciplinary field of engineering known as Smart Structures has developed as one of the most important research topics in the field.The structure is formed by a marriage of engineering materials with structurally-integrated sensor systems. The system is capable of assessing damage and warning of impending weakness in the structural integrity of the structure. Fibre-optic sensor technology is a most attractive device currently used in the aerospace and aircraft industry for on-line monitoring of large-scale FRP structures. The development of distributed fibreoptic sensors, which provides information on a large number of continuously distribution parameters such as strain and temperature is of great interest in most engineering applications.11,12 The sensors are embedded into a structure to form a novel self-strainmonitoring system, i.e. the system can self-detect its health status and send response signals to operators during any marginal situation during service. The embedding sensor, due to its extremely small physical size, can provide the information to a high accuracy and resolution without influencing the dimension and mechanical properties of the structure. Fibre-optic sensors present a number of advantages over the conventional strain measuring devices: (a) providing an absolute measurement that is sensitive to fluctuation in irradiance of the illuminating source; (b) enabling the measurement of the strain in different locations in only one single optical fibre by using multiplexing techniques;(c) having a low manufacturing cost for mass production; and (d) its ability to be embedded inside a structure without influencing the mechanical properties of the host material. A new development of Smart materials and structures was driven by a strong demand for high performance over recent years. A system integrated into structures and being able to monitor its hosts physical and mechanical properties such as temperature and strain, during service is appreciated as a Smart structural health monitoring system. The term smart material and structure is widely used to describe the unique marriage of material and structural engineering by using fibre-optic sensors and actuation control technology. The smart structure is constructed of materials that can continuously monitor their own mechanical and physical properties, and thereby, be capable of assessing damage and warning of impending weakness in structural integrity. This design concept results in improved safety and economic concerns regarding the weight saving and avoidance of over-designing of the structure in the long run. In Fig. 1, a schematic illustration of the structures possibilities created by the confluence of the four disciplines is shown. In the figure, a structure invested with actuating, sensing and neutral networking systems to form a new class of adaptive structures is shown. A structure with integrated sensor or actuator systems is able to provide a self-structural health monitoring or actuating response, respectively. If both systems are integrated together into a structure, the sensor and actuators can act as nervous and muscular systems, like a human body, to sense the conditions such as mechanical strain and temperature of the structure (a smart structure) and to provide control of such changes of stiffness, shape and vibration mode (a controlled structure). The combination of these two systems into one structure is called a Smart adaptive structure. This structure with a built-in neural networking system, like a brain, is then able to self evaluate the conditions, which are based on changes of structural parameters, thermal conditions and ambient environments to give an appropriate mechanical adjustment. This structure is commonly called an Intelligent adaptive structure. 1.1 BACKGROUND OF THE STUDY There has been an unprecedented development in the fields of optoelectronics and fiber optic communications. This in turn, has brought about a revolution in the sectors of telecommunication and various other industries. This has been made possible with the aid of high performance and reliable telecommunication links which have low bandwidth cost. Optical fibers have numerous advantages and some disadvantages. The advantages include their small size, resistance to electromagnetic interference and high sensitivity. On the other hand, some of its disadvantages are their high cost and unfamiliarity to the end user. But its great advantages completely overshadow its minor disadvantages. So, in this study an attempt is being made to compare the modern age fiber optic sensors with the conventional sensors. Also, with the aid of the case studies, the impact of fiber optic sensor technology on monitoring of civil structures is studied (McKinley and Boswell 2002). 1.2 PROBLEM STATEMENT In the past various kinds of sensors have been used in civil engineering for measuring temperature, pressure, stress, strain etc. And as the optical fiber sensors spread their wings, the civil engineering is bound to gain a lot from these modern sensors. Presently, there exist a number of problems with the existing civil infrastructures. These civil infrastructures such as bridges etc. have a pretty long service period which may amount to several decades or maybe even hundred years. Thus, during this time period, these structures suffer from corrosion, fatigue and extreme loading. Since concrete is used mostly in these civil infrastructures, it degradation is a major issue all over the world. The amount of degradation and the time when the degradation starts depends on various factors and is inevitable and unavoidable. Thus, in order to keep these civil structures in good condition, it becomes necessary that their condition be monitored and adequate steps be taken. Thus, we need sensors which can monitor these structures throughout the life of these structures. Thus, in this study the impact of fiber optic sensors is studied on civil structures. 1.3 OBJECTIVES There are a few objectives that are planned to be achieved at the end of this project, these are: A general discussion on the present state of structural monitoring and the need of fiber optic sensors in this field A general study on Comparison between Conventional Sensors and Optical Fiber Sensors Review of Case Studies on Fiber Optic Sensors application in Civil Engineering Structures 1.4 WORK PLAN Discussion, reading and observation Problem identification through reading, discussion and observation of the area studied Understand and identify the background of problem Studying feasibility and needs to carry out the investigation Identification of the Title for the project Identify the aim, objective and scope of the project Literature Review Understanding the background of the problem Understanding the history of the sensor technology in structural monitoring Carrying out literature survey on generic technologies of sensors for concrete structures Identify the types of sensor involved in monitoring the structural in civil engineering Identify the technique used and the working principle for each type of sensors (in particular optical fiber sensors) Case Study Choose the relevant and related case study for discussion Describe important aspects of case study Analyze the use of sensors in the case study Discussion, Conclusion and Recommendations Discuss the similarities and differences Discuss the technical facets of sensor application Draw the overall conclusion for this project Give some recommendation for future Chapter 2: APPLICATIONS These days the fiber optic sensors are being used for a variety of applications, the most prominent of them being: Measurement of rotation and acceleration of bodies Measurement of electric and magnetic fields Measurement of temperature and pressure of bodies Measurement of acoustics and vibrations of various bodies Measurement of strain, viscosity and chemical properties of materials Measurement of surface condition and tactile sensing Measurement of sound , speed and proximity of bodies Determination of color and weight of different objects Measurement of linear and angular positions and this is widely utilized in civil engineering structures 2.1 ADVANTAGES OF FIBER OPTIC SENSORS Like with any other technology, there are both advantages and disadvantages using fiber optic sensors. The prominent advantages being: Fiber optic sensors are lightweight and this is of great importance in case of engineered structures Fiber optic sensors are of smaller size as compared to the traditional sensors Also, fiber optic sensors consume less power as compared to the traditional sensors Along with this, these sensors show high resistance to electromagnetic interference as compared to the traditional sensors On top of this, fiber optic sensors have enjoy high bandwidth and high sensitivity as compared to their traditional counterparts Fiber optic sensors are usually embedded in objects and due to this, these sensors can gain access to areas which till date remain inaccessible with the aid of traditional sensors Also, these sensors are accurate over a greater dynamic range as compared to the traditional sensors Fiber optic sensors are also capable of being multiplexed which again is a further advantage over their traditional counterparts Also, fiber optic sensors are capable of distributed measurements which gives them an edge over and above the traditional sensors Last but not the least, they also show greater environmental ruggedness as compared to the traditional sensors 2.2 DISADVANTAGES OF FIBER OPTIC SENSORS But all this is just one side of the coin. Though on seeing these advantages, it might appear that fiber optic sensors are way too advanced as compared to the traditional ones, but it is not exactly true. These fiber optic sensors also have some disadvantages due to which their advancement in todays world has been somewhat curtailed. The major disadvantages of fiber optic sensors are: Fiber optic sensors are quite costly as compared to the traditional sensors. Due to this, many people still consider traditional sensors to be a better option in cases where cost is a major consideration. Secondly, these sensors have come into prominence only in the last two decades. Due to this, people appear to be somewhat less educated regarding their usage and operations. And this unfamiliarity with the usage of these sensors, has proved to be a major hurdle in being able to capture the whole market. Also, these sensors are considered to be more fragile as compared to the traditional sensors which raises a question over their adaptability in extreme conditions Also with the fiber optic sensors there exists the inherit ingress/egress difficulty Fiber optic sensors usually have a non-linear output which is a cause for concern in some applications From the above discussion, we can see that as is the case with any other new technology, there are both merits and demerits of fiber optic sensors. But, what is worth considering here is that the advantages of this technology are much more than its disadvantages and are able to outweigh them. Also, from the demerits which are mentioned here, it is clear that these demerits are bound to wither away as this technology develops and gains more prominence. 2.3 APPLICATIONS IN CIVIL ENGINEERING Now we come to the discussion of the need and applications of the fiber optic sensors in the field of civil engineering structures. The monitoring of civil structures has a great significance in todays world. Today, we not only need to construct reliable and strong civil structures, but we also need to monitor these structures in order to ensure their proper functioning and their safety. Also, with the aid of the monitoring of various parameters of the structures, we can get knowledge about state of the building and by using this data, we can in turn plan the maintenance schedule for the structure (Mckinley, 2000). Also, this data can give us an insight into the real behavior of the structure and can thus take make important decisions regarding the optimization of similar structures which are to b e constructed in future. The maintenance of the structures can be approached in one of the two ways, namely: Material point of view- In this approach, monitoring is concentrated on local properties of the materials which are used in the construction. In this approach, we observe the behavior of the construction materials under the conditions of load, temperature etc. In this approach, short base length sensors are usually utilized. Also, it is possible to get the information about the whole structure with the aid of extrapolation of the data obtained from these sensors. Structural point of view- In this approach of measurement, the structure is viewed from a geometrical point of view. In this approach, long gauge length sensors appear to be the ideal choice. In this approach, we will be able to detect material degradation only if this material degradation has an impact on the form of the structure. In the recent years most of the research work which has been carried out in field of optic sensors has been in the field of material monitoring rather than structural monitoring. It is also worth mentioning here that, more sensors are required in the case of material monitoring as compared to structural monitoring. We know that civil engineering requires sensors that can be embedded in the concrete, mortars, steel, rocks, soil, road pavements etc. and can measure various parameters reliably. Also what should be taken into account is that these sensors should be easy to install and should not hamper the construction work or the properties of the structure in any derogatory manner. Also, it is common knowledge that at the sites of civil engineering, there exist the unavoidable conditions of dust, pollution, electromagnetic disturbances and of unskilled labor. Thus, the sensors to be used in these cases need to be rugged, should be inert to harsh environment conditions and should be easy to install and their installation could be carried out by unskilled labor. Along with all these things, it is imperative that these sensors are able to survive a period of at least ten years so that they can allow for a constant monitoring of the aging of the structure. Thus, we see that the fiber optic sensors ca n prove to be quite handful in civil engineering applications and structures. In the past various kinds of sensors have been used in civil engineering for measuring temperature, pressure, stress, strain etc. And as the optical fiber sensors spread their wings, the civil engineering is bound to gain a lot from these modern sensors (Vurpillot et al., 1998). Chapter 3: LITERATURE REVIEW ON FIBER OPTIC SENSORS Fiber optic sensors are of many kinds, but they can be broadly classified into two types, namely, extrinsic fiber optic sensors and intrinsic fiber optic sensors. There is a great deal of difference between these two types of fiber optic sensors and this difference is discussed in detail below. 3.1 EXTRINSIC FIBER OPTIC SENSORS This type of fiber optic sensor is also known as hybrid fiber optic sensor. As we can see in the figure above that there is a black box and an input fiber enters into this black box. And from this input fiber, information is impressed upon light beam. There can be various ways by which the information can be impressed upon. Usually this information is impressed upon the light beam in terms of frequency or polarization. This light which then posses the information is carried away by the optical fiber. The optical fiber now goes to an electronic processor. (Vurpillot et al., 1998) Here, in the electronic processor the information which is brought along by the fiber is processed. Though we can have separate input fiber and output fiber, but in some cases it is preferred to have the same fiber as the input fiber and the output fiber. 3.2 INTRINSIC FIBER OPTIC SENSORS Intrinsic fiber optic sensors Extrinsic fiber optic sensors In this sensor, the fiber itself acts as the sensor medium In this sensor, the fiber does not act as the sensor medium. It merely acts as a light delivery and collection system In this fiber optic sensor, the light never leaves the medium and always stays inside the medium In this fiber optic sensor, the light leaves the medium, then it is altered in some way and is collected by another fiber. 3.3 INTENSITY BASED FIBER OPTIC SENSORS While there exist various kinds of fiber optic sensors today, but the most common of these sensors is the hybrid type fiber optic sensor which depends upon intensity modulation in order to carry out the measurements (Zako et al., 1995) The functioning of this fiber optic sensor is quite simple. In this fiber optic sensor, light enters from one side. And when this light exits from the other side, it exits in the form of a cone and the angle of this cone depends on two parameters. The two parameters upon which the angle of this cone depends are: Firstly, it depends on the index of refraction of the core Secondly, it depends on the cladding of the optical fiber Also, the amount of light captured by the second optic fiber depends on a number of factors. The prominent factors on which the amount of light captured depend are: It depends on the acceptance angle It also depends on the distance d between the optical fibers Another type of fiber optic sensor is the flexible mounted mirror sensor. The important characteristics of this sensor are: In this case, a mirror is mounted which is used to respond to external parameters such as pressure. The modulation in intensity is caused the shifts in the mirror position. These sensors are used in a variety of applications such as door closures. In a door closure, a reflective strip is used. These sensors are used to measure small variations and displacements 3.4 LINEAR POSITION SENSORS In todays world, linear position sensors have become widely applicable. They are being used for various purposes (Zako et al., 1995). In many of the linear positioning sensors, wavelength division multiplexing is used. An illustration of the linear position sensor is shown in the figure below. The various components of this linear position sensor are: It consists of a broadband light source It consists of various detectors as shown in the figure above It also consists of wavelength division multiplexing element which acts as the principal component of this instrument. It also consists of an encoder card In the example above, a broadband light source is utilized. The light from this broadband source is carried to a wavelength division multiplexing system with the aid of a single optic fiber. The wavelength division multiplexing system is used to determine the linear position. Another linear motion sensing method which is very widely used today and is quite similar to the method discussed above is known as the time division multiplexing method. In this method instead of a broadband light source a light pulse is used. Here, the combination of the returned signals takes place. As a result of this combination of the returned signals, the net signal which is produced moves onto the position of the encoder card. The main areas in which these intensity based fiber optic sensors have found application are: In commercial aircrafts In military aircrafts In these applications these modern sensors have performed quite well and are at par with the performance of the conventional sensors. But, because of the various advantages these sensors enjoy over and above the conventional sensors, these modern sensors are bound to replace the conventional sensors in the years to come. 3.5 LIQUID LEVEL SENSORS This is another type of intensity based fiber optic sensor. In the functioning of this sensor, the principle of total internal reflection is utilized. Thus, in these sensors the refraction index of the glass and the fiber occupy the pivotal role. These sensors can be utilized for a variety of purposes. The most prominent of its applications are: Measurement of pressure changes in gels Measurement of pressure changes in various liquids Measurement of refractive index changes in gels Measurement of refractive index changes in different types of liquids Measurement of the level of a liquid in a vessel and this application is utilized in various industries to measure liquid levels These sensors have an accuracy of about 5 percent and are gaining importance in various industries for their usefulness. 3.6 SOFO SENSORS These are fiber optic sensors which are utilized for strain measurement. These sensors have become quite popular owing to their innate merits. Out of all the fiber optic sensors, these sensors are the ones which are being used most extensively today. These sensors are being used to measure curvature and various other parameters in giant civil structures. These sensors form a part of the interferometric system (Vurpillot et al., 1998). Also, these sensors have the ability of measuring the parameters in an absolute manner using low-coherent light. The important properties of these sensors are: These fiber optic sensors enjoy a high resolution. The resolution of these sensors is 2 Â µm These sensors can be of varied lengths. Their length can be as small as 0.2m or can be as large as 20m. Also, these sensors have the property of being temperature compensated The SOFO system setup consists of a number of equipments. The main components of the SOFO system setup are: It consists of a fiber optic sensor which forms the crux of this monitoring system. It is the most important component of the monitoring system. It consists of a sensor chain with partial reflectors. One terminal of this sensor is connected to the coupler Another terminal of the sensor chain with partial reflectors is connected to the LED. The coupler in turn is connected to the photo diode and a mobile mirror. This whole portable reading unit is connected to portable computer terminal. This ensures that that the whole monitoring system can be taken to the location and can be directly used at site. These sensors can be utilized in two ways. They can either be embedded in the structure at the time of the construction of the structure. Or, they can used to measure the various parameters externally. Though in both the cases, that is, in case of embedding or in the case of external anchoring, the performance of the sensors remains the same, but still, in modern smart structures, embedding is preferred (Perez 2001). .This is because, in the case of embedded sensors, the sensors continuously measure the parameters and are easy to manage. Whereas in the older structures, where embedding is not preferred, external anchoring is used. Chapter 4: CASE STUDIES Case study 1: Monitoring of San Giorgio pier San Giorgio pier is a massive concrete structure. Its length is about 400metres. It is very essential to carry out its monitoring in order to know about its deformation. This in turn, is very useful in determining the safety of this pier. At this pier, it was earlier proposed to use the conventional methods to monitor the deformation. This involved the use of conventional sensors for measurement. But, the problem with this method was that in the case of conventional sensors, we could get the data of the various parameters of the pier for only a short period. And, as we know that in order to determine anything conclusively about such large concrete structures we need data for a very long period. But, here as it was the case with the conventional sensors, we could get data only for short periods. Thus, with the aid of the conventional methods which were employing conventional sensors, we could not say anything conclusively. (Andrea Del Grosso et al.) Thus, there existed the need to emp loy fiber optic sensors in order to determine the deformation of this massive pier. It was possible to measure the deformation of this pier with the aid of the fiber optic sensors because of the following advantages which the fiber optic sensors enjoy over and above the conventional sensors: Fiber optic sensors are long base strain sensors and this property of the fiber optic sensors was very important in this case. This was because, as the pier was a massive concrete structure, therefore, measurement of

Saturday, January 18, 2020

Infosys Case Study

Oracle Customer Case Study Infosys Goes to University to Build Business Worldwide â€Å"The quality of the courses is very good and the materials are extremely well designed. We have also had extremely strong feedback from Infosys staff who have completed courses at Oracle University. † – Dr Subhash Chandra Rastogi, Head, Enterprise Solutions Academy, Infosys Technologies Ltd Infosys Technologies Ltd (NASDAQ: INFY) defines, designs, and delivers IT-enabled business solutions. These solutions focus on providing clients with strategic differentiation and operational superiority. Infosys creates these solutions by leveraging its domain and business expertise to offer a complete range of services. For the fiscal year ending March 31, 2007, Infosys recorded revenues of more than US$3 billion with net income of over US$850 million. Infosys is a NASDAQ 100 company. Infosys uses a global alliance with Oracle to deliver Oracle-based systems and services to clients worldwide. These enable businesses to build a more flexible architecture to support faster deployment of new applications, achieve a consolidated view of their global supply chain, reduce costs by leveraging global sourcing, or employ predictive capabilities to exploit emerging opportunities or avert looming obstacles. To support Infosys’ status as a Global SI Partner—recognized at the Worldwide Certified Advantage Partner level—Oracle has provided extensive training support through its Oracle University educational resource. More than 3,000 Infosys employees globally have benefited through Oracle University-based knowledge, enabling them to deliver Oracle products and services to a high level of expertise. Oracle University courses typically run between five and 15 days, depending on the complexity of the product and associated business process changes. â€Å"The quality of the courses is very good and the materials are extremely well designed,† said Dr Subhash Chandra Rastogi, head of the Enterprise Solutions Academy at Infosys. We have also had extremely strong feedback from Infosys staff who have completed courses at Oracle University. † Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Infosys Technologies Ltd Bangalore, India www. infosys. com Industry: Professional Services Annual Revenue: US$3. 09 billion Employees: 80,500 Orac le Products & Services: Oracle University Key Benefits: Ensured more than 100 staff are certified in Oracle E-Business Suite, qualifying them to deliver the solution to customers worldwide Provided feedback into the beta version of Oracle E-Business Suite Enabled staff around the world to undertake training in their own time via online courses Enabled more than 3,000 employees to take various Oracle University learning programs through a range of delivery modes Oracle Customer Case Study Upskilling Delivers Results Infosys is one of the world’s most rapidly growing consulting and information technology services companies. In 2007, the company’s revenues crossed US$3 billion. Key to the company’s success is its low-risk, high-quality Global Delivery Model, whereby work is broken up into logical components to be completed in the most efficient location. With staff numbers rising sharply, in 2003 Infosys created an Enterprise Solutions Academy (ES Academy) within the company to manage the educational requirements of everyone from new recruits to 20-year veterans. The ES Academy currently has to service an annual intake that reached 1,740 engineers and MBA graduates in 2006. â€Å"This is a very different concept for a systems integrator, but we had to ensure our staff could get the expertise nd certification needed to service our clients to the very highest level,† said Dr Rastogi. While the ES Academy itself provides an extensive portfolio of training and certification courses, the academy has partnered with Oracle University to provide its consultants with training in Oracle products. â€Å"Oracle is constantly growing its portfolio of solu tions, upgrading existing products, and acquiring new product companies,† said Dr Rastogi. â€Å"Oracle University provides expert, in-depth training across the Oracle suite of products and services. There is no point in us trying to duplicate this effort or invest in something we don’t need to,† he added. Participating in the Oracle University program brings benefits to Infosys other than a more skilled workforce. As a strategic partner to Oracle, Infosys can also contribute knowledge to the development of new Oracle products and services. â€Å"We did contribute to the beta certification of Oracle E-Business Suite, with more than 150 Infosys consultants providing input to Oracle University as to where the product could be improved,† said Dr Rastogi. We now have more than 100 people certified in Oracle E-Business Suite—more than anyone else in the world— and they continue to provide lots of input to Oracle as well as staying appraised of new developments. † Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Oracle Customer Case Study Oracle University Reviews Infosys Curriculum It often becomes viable for the ES Academy to deliver Oracle courses internally based on the level of demand, or for some basic products. For example, 85% of consultants that specialize in relatively ‘vanilla’ products such as Oracle9i Database are trained in-house, with the remaining 15% undertaking courses at Oracle University. â€Å"To ensure quality, we engaged Oracle University to review our curriculum content, materials, and questions for course attendees,† said Dr Rastogi. â€Å"They give us sound advice that ensures we deliver the best possible internal courses. † These courses do not cover newer products, or products taken on through acquisition of companies such as Hyperion or Demantra. About 95% of consultants that specialize in these new areas take the relevant courses from Oracle University. Overcoming the Tyranny of Distance Infosys’ burgeoning growth within India and worldwide has created a geographically distributed organization that makes delivering face-to-face training, a sometimes costly exercise. â€Å"This has posed a problem for us because people in India are not used to alternatives such as e-learning,† said Dr Rastogi. â€Å"People prefer to come to a classroom. â€Å"In addition, the firewall we apply across our systems prevents Infosys employees from viewing streaming audio and video. To create more flexibility for staff to access the online courses available through Oracle University, Infosys is establishing e-libraries in offices in Pune, Mangalore, and Hyderabad. These currently include 20 PCs where staff can access streaming audio and video. This number is expected to grow to 100–150 by late 2008 across various locations i n India. Employees working in Europe and the U. S. are already benefiting from streaming audio and video. The availability of online courses through Oracle University means staff will be able to undertake training without disrupting their client work. The benefits of e-learning apply to staff outside India as well. â€Å"Our certification program applies to employees regardless of Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Oracle Customer Case Study country,† said Dr Rastogi. â€Å"We have 25 to 30 staff who specialize in Oracle E-Business Suite who work in Europe or the U. S. † Helping Ambitious Employees to Get Ahead A certification from Oracle University can provide ambitious employees with an edge in the competitive Infosys culture. Because it’s an external certification, it provides good branding for an employee,† said Dr Rastogi. â€Å"They become of greater value to Infosys and to our customers. † Infosys Technologies Ltd (NASDAQ: INFY) defines, designs, and delivers ITenabled business solutions. For the fiscal year ended Marc h 31, 2007, Infosys recorded revenues of more than US$3 billion with net income of over US$850 million. Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Infosys Case Study Oracle Customer Case Study Infosys Goes to University to Build Business Worldwide â€Å"The quality of the courses is very good and the materials are extremely well designed. We have also had extremely strong feedback from Infosys staff who have completed courses at Oracle University. † – Dr Subhash Chandra Rastogi, Head, Enterprise Solutions Academy, Infosys Technologies Ltd Infosys Technologies Ltd (NASDAQ: INFY) defines, designs, and delivers IT-enabled business solutions. These solutions focus on providing clients with strategic differentiation and operational superiority. Infosys creates these solutions by leveraging its domain and business expertise to offer a complete range of services. For the fiscal year ending March 31, 2007, Infosys recorded revenues of more than US$3 billion with net income of over US$850 million. Infosys is a NASDAQ 100 company. Infosys uses a global alliance with Oracle to deliver Oracle-based systems and services to clients worldwide. These enable businesses to build a more flexible architecture to support faster deployment of new applications, achieve a consolidated view of their global supply chain, reduce costs by leveraging global sourcing, or employ predictive capabilities to exploit emerging opportunities or avert looming obstacles. To support Infosys’ status as a Global SI Partner—recognized at the Worldwide Certified Advantage Partner level—Oracle has provided extensive training support through its Oracle University educational resource. More than 3,000 Infosys employees globally have benefited through Oracle University-based knowledge, enabling them to deliver Oracle products and services to a high level of expertise. Oracle University courses typically run between five and 15 days, depending on the complexity of the product and associated business process changes. â€Å"The quality of the courses is very good and the materials are extremely well designed,† said Dr Subhash Chandra Rastogi, head of the Enterprise Solutions Academy at Infosys. We have also had extremely strong feedback from Infosys staff who have completed courses at Oracle University. † Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Infosys Technologies Ltd Bangalore, India www. infosys. com Industry: Professional Services Annual Revenue: US$3. 09 billion Employees: 80,500 Orac le Products & Services: Oracle University Key Benefits: Ensured more than 100 staff are certified in Oracle E-Business Suite, qualifying them to deliver the solution to customers worldwide Provided feedback into the beta version of Oracle E-Business Suite Enabled staff around the world to undertake training in their own time via online courses Enabled more than 3,000 employees to take various Oracle University learning programs through a range of delivery modes Oracle Customer Case Study Upskilling Delivers Results Infosys is one of the world’s most rapidly growing consulting and information technology services companies. In 2007, the company’s revenues crossed US$3 billion. Key to the company’s success is its low-risk, high-quality Global Delivery Model, whereby work is broken up into logical components to be completed in the most efficient location. With staff numbers rising sharply, in 2003 Infosys created an Enterprise Solutions Academy (ES Academy) within the company to manage the educational requirements of everyone from new recruits to 20-year veterans. The ES Academy currently has to service an annual intake that reached 1,740 engineers and MBA graduates in 2006. â€Å"This is a very different concept for a systems integrator, but we had to ensure our staff could get the expertise nd certification needed to service our clients to the very highest level,† said Dr Rastogi. While the ES Academy itself provides an extensive portfolio of training and certification courses, the academy has partnered with Oracle University to provide its consultants with training in Oracle products. â€Å"Oracle is constantly growing its portfolio of solu tions, upgrading existing products, and acquiring new product companies,† said Dr Rastogi. â€Å"Oracle University provides expert, in-depth training across the Oracle suite of products and services. There is no point in us trying to duplicate this effort or invest in something we don’t need to,† he added. Participating in the Oracle University program brings benefits to Infosys other than a more skilled workforce. As a strategic partner to Oracle, Infosys can also contribute knowledge to the development of new Oracle products and services. â€Å"We did contribute to the beta certification of Oracle E-Business Suite, with more than 150 Infosys consultants providing input to Oracle University as to where the product could be improved,† said Dr Rastogi. We now have more than 100 people certified in Oracle E-Business Suite—more than anyone else in the world— and they continue to provide lots of input to Oracle as well as staying appraised of new developments. † Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Oracle Customer Case Study Oracle University Reviews Infosys Curriculum It often becomes viable for the ES Academy to deliver Oracle courses internally based on the level of demand, or for some basic products. For example, 85% of consultants that specialize in relatively ‘vanilla’ products such as Oracle9i Database are trained in-house, with the remaining 15% undertaking courses at Oracle University. â€Å"To ensure quality, we engaged Oracle University to review our curriculum content, materials, and questions for course attendees,† said Dr Rastogi. â€Å"They give us sound advice that ensures we deliver the best possible internal courses. † These courses do not cover newer products, or products taken on through acquisition of companies such as Hyperion or Demantra. About 95% of consultants that specialize in these new areas take the relevant courses from Oracle University. Overcoming the Tyranny of Distance Infosys’ burgeoning growth within India and worldwide has created a geographically distributed organization that makes delivering face-to-face training, a sometimes costly exercise. â€Å"This has posed a problem for us because people in India are not used to alternatives such as e-learning,† said Dr Rastogi. â€Å"People prefer to come to a classroom. â€Å"In addition, the firewall we apply across our systems prevents Infosys employees from viewing streaming audio and video. To create more flexibility for staff to access the online courses available through Oracle University, Infosys is establishing e-libraries in offices in Pune, Mangalore, and Hyderabad. These currently include 20 PCs where staff can access streaming audio and video. This number is expected to grow to 100–150 by late 2008 across various locations i n India. Employees working in Europe and the U. S. are already benefiting from streaming audio and video. The availability of online courses through Oracle University means staff will be able to undertake training without disrupting their client work. The benefits of e-learning apply to staff outside India as well. â€Å"Our certification program applies to employees regardless of Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008 Oracle Customer Case Study country,† said Dr Rastogi. â€Å"We have 25 to 30 staff who specialize in Oracle E-Business Suite who work in Europe or the U. S. † Helping Ambitious Employees to Get Ahead A certification from Oracle University can provide ambitious employees with an edge in the competitive Infosys culture. Because it’s an external certification, it provides good branding for an employee,† said Dr Rastogi. â€Å"They become of greater value to Infosys and to our customers. † Infosys Technologies Ltd (NASDAQ: INFY) defines, designs, and delivers ITenabled business solutions. For the fiscal year ended Marc h 31, 2007, Infosys recorded revenues of more than US$3 billion with net income of over US$850 million. Copyright  © 2008, Oracle. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Published February 2008

Friday, January 10, 2020

Police Thesis

CHAPTER 1 Introduction A. Background of the Study In the early years man had a difficult to accomplish their task in short period of time. Their works was never accurate and efficient since people had to do their jobs or responsibilities, manually. Hence, man has continuously looked for a better ways of doing things, for each invention and new development man had to extend their capabilities for making jobs easier and faster so as save time and effort. Man’s curiosity brought for the way of automation.Automation can be defined as a technology concerned with performing a process by means of programmed commands combined with automatic feedback control to ensure proper execution of the instructions. The development of this technology has become an increasingly dependent on the use of computers and computer related technologies. Advanced systems represent a level of capability and performance that surpass in many ways the abilities of human to accomplish the same activities.Manual procedures in performing transactions create problems which results to delay in the generation of reports, consume a lot of time in recording information and retrieving of files. One organization which uses manual record system and encountered those problems is the office of Philippine National Police (PNP) Roxas Zamboanga del Norte. The PNP Roxas, Zamboanga del Norte composing different registered of crime and incident from the different barangay of Roxas Zamboanga del Norte. PNP in cooperation of Local Government Unit (LGU) shall developed and implement programs on preventing crime and incident.The Local Government Unit (LGU) should provide the needs of the PNP Roxas Zamboanga del Norte. According to the PNP staff, recording and retrieving information of the incident and crimes happened and generating of report consume a lot of time since those transactions are done manually. This is the main reason why the researcher wants to conduct a study in the said office. The researcher wa nts to help their office by developing system software, making their transactions faster and easier to handle. B. Theoretical Framework. This study is anchored on Roger Clarke’s (1999) Diffusion of Innovation Theory.His theory describes the pattern of adoption, explains the mechanisms by which they occur, and assists in predicting whether a new invention will be successful. In its early stages, DOI theory was limited to expert in one specific field, examining and evaluating the diffusion of a process which relevant to their specialization. For example, medical sociologist would look a new technology occurring in health care and record the general rates of adoption, at the same time education researcher would study the spread of new teaching methodologist and its inevitable diffusion throughout the school system.Other theory is Everett Roger’s (1995) Diffusion of Innovation Theory. She defines innovation as an idea, practice, or object that is perceived as new by an ind ividual or other unit of adoption. In matters little, so far as human behavior is concerned, whether or not an idea is â€Å"objectively† new as measured by the lapse of time since its first use or discovery. The perceived newness of the idea seems new to the individual, it is innovation.This definition broadly takes on innovation to include not only products such as technological innovation but also ideas and processes that stimulate the development of human potential and organizational processes. Aside from that, Roger also stated in the year 2003 that Diffusion of Innovation theory is the process by which an innovation is communicated through certain channels over time among the members of a social System. † In other words, the study of the diffusion of innovation is the study of how, why, and at what rate new ideas and technology spread through cultures.The Office of PNP, Roxas, Zamboanga del Norte one of the offices that use a manual system in making Spot Report. T heir Spot Report procedures are done through the recording the information into the log book. By adopting the theory the researchers had enhanced the Spot Report of the said office and made known as Automated Crime and Incidents Record Keeping System. C. Conceptual Framework This figure below is the conceptual framework of the study which is represented by these three frames. The first frame refers to the system currently used by the office of the PNP Roxas Station which is Manual Record System.Through the used by the Manual Record System problems occur such as time consuming and delay in the recording and retrieving of information and generation of reports which can be seen in the second frame. Frame two (2) is the reason why the Automated Record System, Frame three (3) will be the focus of the researcher’s study in order to help the PNP in the processing of their transactions easier and faster. ManualRecordSystem| | Time consuming and delayed in the recording and retrieving of information and generation of reports| | Automated Crime and Incidents Record KeepingSystem| Figure 1.Conceptual Framework of the study This figure shows the conceptual framework of the study indicating the present system used at the PNP in processing their transactions. The problems they have encountered and the proposed system that that will help the PNP solve the problems they have encountered. D. Statement of the problem This study aims to design an Automated Record System at the Office of PNP Roxas Zamboanga del Norte. This study will seek to answer the following 1. What are the problems encountered in the Manual Record System at the Office of the PNP Roxas? 2. What system can be made to eliminate those problems?E. Objectives of the Study This study will be conducted in order to: 1. Identify the problems encountered in the PNP Roxas. 2. Develop a system that could eliminate those problems. F. Scope and Limitation This study was conducted at the Office of the PNP, Roxas Zamb oanga del Norte. The study was focused on the spot report, encoding incidences, crimes and generating reports. This study was conducted during the second semester of the SY 2011-2012. G. Significance of the Study The researcher conducted a study on Automated Record System at the Office of the PNP, Roxas Zamboanga del Norte.This study will aim to help the personnel responsible in the crimes and incident records and in the generation of reports to reduce time am effort in recording and retrieving of files. Through this Automated Record System, time consumed in recording information of the crimes, incidence and delays in the generation of reports encountered by the personnel will be reduced if not totally eliminated. For the researcher, this study will enhance their knowledge regarding system development For the future researchers, this study will serve as their reference in conducting system study. H. Operational Definition of Terms Activities or Programs.This refers to the different activities of the PNP like monthly assembly, police drill, etc. Admin. The one who is in charge and provides the recruitment information. Alert Team. The One who is responsible on responding incidents. Finance. The one that responsible on financing matters. Intelligence Division. The one who is responsible on secret record movement and illegal activities of the community. Investigator. The one who is responsible on investigative matters. Operation. The one who is responsible on operational function PCR. â€Å"Police Community Relation† the one who is responsible of the relationship of the community and police.Radio Operator. The one who is responsible in transmitting and receiving information. Spot Report. A report regarding to a happened incidents or crimes. Warrant & Subpoena Server. Te one who is responsible on issuing warrant and subpoena. Chapter 2 Review of Related Literature As we continue to barrel through the information age, it is hard to imagine conducting busi ness without computers. Each day, millions of people working in offices and homes around the world depend on computer technology to do their jobs efficiently and economically.To truly understand the computer’s history involves a daunting journey through mathematics, physics, and electrical engineering; through binary code, Boolean logic, real time, magnetic core memories, floating-point numeral notation, transistors, semiconductors, integrated circuits, and much, mush more. Luckily, most office workers do not need to understand this complex history to use computers and the dizzying array of software programs they execute. When computers were first developed nearly fifty years ago, the people who programmed them considered the task quite maddening.Fortunately, learning to use a personal computer today is often as simple as spending a few hours reading an instruction manual or following a hands-on tutorial. In recent years, computer technology has been incorporated into a wide range of costumers and industrial product. Computers are routinely used into word processing, email, video games, and other application that require repetitive tasks that can be automated. The offices and government institutions mentioned below are among the thousand of offices where application for membership are automated.One example is the Department of Social Welfare and Development. They are currently using the e-Donation Management System through a Memorandum of Agreement (MOA) with Globe X-Change Inc. (GXI) and Memorandum of Understanding (MOU) with the National Computer Center (NCC). The DSWD e-Donation Management System aims to provide the donor community a more convenient and cost-effective option of giving cash donation through the use of technology, such as short messaging services [SMS] or text message, as well as via online or internet.Likewise, it is a costume-designed turnkey solution that delivers, managers, and reconciles contribution and donations via text online transactions, working on a banking industry-standard ICT security environment, and a stable and scalable database system. This system takes the nature of an electronic payment system which is efficient and transparent, as well as fully received trough donation. Another is Tricare records-processing system. The TED system helps civilian providers get paid promptly for the services they provide to Tricare beneficiaries outside of military treatment facilities.Records are processed for provider payments in less than 24 hours in most cases. The ease and speed of the TED system gives providers an incentive to participate in Tricare. Increased participation in Tricare networks provides beneficiaries better access to health care. By verifying and analyzing the information in each records, the TED system allows providers payments to occur promptly and helps prevent payment of duplicate, fraudulent or erroneous claims. The information in the TED system provides data for developing health car e treads and budgets projection.TED system staff members have processed more than $140 billion of purchased services for Tricare beneficiaries worldwide since 2004. The Government Services Insurance System also uses the ECard System in which using your eCard plus, you can check your GSIS records, renew your active status (for Pensioners), and even apply for GSIS loans, when you go to any [email  protected] kiosk installed in all GSIS offices and other major government offices all over the country and manage your eCard Plus ATM account or pay bill online.Also the electronic medical record (EMR) is a computerized medical record created in an organization that delivers care, such as a hospital and doctor’s surgery. Electronic medical records tend to be part of a local stand-alone health information system that allows storage, retrieval and modification of records. Aside from that the Records management, or RM, is the practice of maintaining the records of an organization from the time they are created up to their eventual disposal. This may include classifying, storing, securing, and destruction (or in some cases, archival preservation) of records.A record can be either a tangible object or digital information: for example, birth certificate, medical x-rays, office documents, databases, application data, and e-mail. Records management is primarily concerned with the evidence of an organization’s activities, and is usually applied according to the value of the records rather than their physical formal. Haryana Government is also using a system known as Haryana Land Record Information System. This system is a based software system used by the Haryana government for the computerization of land records in its tehsils. It was developed by NIC Haryana state Unit.Chapter 3 Methodology A. Settings of Study One of the first section citizens read in the local newspaper is the police spot report which contains information on crimes and incident that could af fect them directly. The kind of information provided, however, largely depends on the publication. Local newspapers typically review these records, called spot and reports and print the crimes and incidents happen. Many police departments maintained a handwritten daily spot report. A police report is a record of crimes and incident and committed in a certain area during a certain period of time.Police agencies are required to keep a record of daily activities that can be inspected by the public. So as a police investigator, a factual, precise, accurate information must be posted in the police spot record and its depends upon the agency what type of information they want publish. Police spot report in certain cases, note a suspect’s name, age and address. A name of the victim or complaining party might also be included, but police might avoid providing additional of information if discretion is warranted. Where the crime occurred(at a residence, a business or elsewhere) should be noted as well.Likewise, if a vehicle was damaged or an item was stolen, those things might also be noted. This are the information to be stored in the system to make it easy to find the crimes in the previous recorded incidents. The purpose of a police spot report is to provide an accurate written account of a police officer’s observations during the investigation of a criminal incident. A police spot report can only be written by the officer(s) involved in the investigation of an incident. Each officer who makes a report must swear to its accuracy by signing it.The purpose of making a police spot report into database is to make the investigator easy to find or locate the file that being input in the previous record. PNP Head The figure below shows the organizational structure of the Office of the PNP. ADMIN Operation Radio Operator Intelligence Division Warrant/Subpoena Server PCR SALAAM Alert Team Investigator Finance Figure 2 Organizational Chart The organizational cha rt of the Office of the Philippine National police Roxas Zamboanga del Norte. This figure shows the hierarchy supervision at the Office of the Philippine National Police (PNP). B.Research Design and Procedure of the Study Request letter was sent to the Office of the Philippine National Police (PNP) asking permission to conduct a study in their office. It was followed with the distribution of questionnaire and the conduct of an interview. The researchers in return were provided useful tools such as the organizational structure and different forms like Spot Report form and the master list of the Crimes and Incidents. The researcher have also browsed the internet to gather some related literatures as their basis for the study. The preparation of the manuscript for the system proposal followed.Upon approval, the researcher started to design an Automated Crimes and Incident Record System. Figure 3 on the next page shows the Gantt chart that reflects he work plan in developing a system. C ost and benefits analysis was made to determine the affordability and worthiness of the system. Gantt chart (Work Plan Schedule) Planned starting date – September 2011 |   |   |   |   |   |   |   |   |   |   |   |   | Number of Months|   |   |   |   |   |   |   |   |   |   |   |   | Activities|   | Sept|   |   | Oct|   |   | Nov|   |   | Dec|   |   | Jan|   |   | Feb|   |   | March|   | Apr|   | 1.Conducting aninterview|   |   |   |   |   |   |   |   |   | |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 2. Planning|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 3. Problem|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | Definition|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 4.System analysis|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | 5. Presentation|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | of the |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | proposal|   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   |   | Planned completion date – April 2012 Figure 3 (Gantt chart) This chart shows the work plan schedule in developing the system.Different activities were listed in order to determine the coverage of the certain activity. This chart also shows when the activities begin and end. C. Data Gathering Procedures The first procedure done by the researchers was conducting an interview to some of the staff of (PNP) for them to know how the PNP Officer processes the Record of Crime and Incidents and what are the problems encountered with regards to the transaction mentioned. When the reserchers found out that the office transactions are done manually, they sent a letter of request to the PNP officer.When the permission was granted, they conducted a formal interview to the PNP Officer , at the same time the questionnaire were given in order to gather more information Another way in which the researchers collected data was browsing the internet and reading some books. The researchers then prepared the proposal for presentation. D. Research Instruments Interview. A tool that was used to gather additional information on how the PNP Officer processed the Crime and Incidents Records. Questionnaires. A tool that was used to collect valuable information from the PNP Officer regarding the flow of processing the Records of Crime and Incidents.Observation. A tool that was also used to gather information by observing on how the Crime and Incidents Records is being done at the Office of the PNP. Journal. A tool that was used to record all observation and investigations done by the researchers so that they will be guided in the preparation and the final presentation of the proposal. Modeling tool. A tool that was used to describe the internal and external behavior of the system. It was composed of two models which is the essential and behavioral model. The environmental model describe the external behavior of the system. E. Data AnalysisData gathered from the research interview was carefully analyzed and interpreted through the cost and benefit analysis. Costs and Benefits estimates and totals at the equivalent money value of the benefits and cost of this system to establish whether this system is worthwhile and affordable to use. The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefits analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the ot her one is the strategic benefits which are an opportunity to save few clerical people as the ability to let the organization do things what would be possible with the current system. F. Cost and Benefit Analysis The purpose of the cost analysis is to calculate all the anticipated cost associated with the system. It concerns not only the cost of building the system, but also the cost of installing, operating and maintaining the system as well as the auxiliary cost, while the benefit analysis has two kinds.One is the tactical benefits that are often associated in reductions in clerical or PNP personnel and the other one is the strategic benefits which are an opportunity to save few clerical people as the ability to let the organization do things what would be possible with the current system. System Development Cost Visual Basic 6. 0Php 9,250. 00 Consultant Fee Php 9,025. 00 TotalPhp 18,275. 00 Present System Annual Operating Cost Office SuppliesPhp 15,465. 00 ElectricityPhp 2,564. 0 0 Hardware MaintenancePhp 2,000,00 TotalPhp 20,029. 00 Proposed System Annual Operating Cost SuppliesPhp 7,560. 00 ElectricityPhp 3,600. 40Hardware MaintenancePhp 2,100. 00 Total Php 13,260. 40 Annual Operating Cost:Php 13,260. 40 Present Annual Operating Cost A. Supplies 1. Ink (6 tubes/yr @ 1,130/tube)Php 6,780. 00 2. Ribbon Cartridge (5 boxes/yr @ 145. 00/box)Php725. 00 3. Bond Paper (5 rims (US long)/yr @240. 00/rimPhp 1,200. 00 (5 rims(US short)/yr @ 235. 00/rimPhp 1,175. 00 4. Stapler (1 pc/yr @ 145. 00/pcPhp 145. 00 5. Stapler Wire (30 boxes/yr @ 50. 00/box)Php 1,500. 00 6. Folder (30 pcs/yr @ 8. 00/pc)Php 240. 00 7. Fastener (15 boxes/yr @ 150. 00/boxPhp 2,250. 00 8. Puncher (1 pcs/yr @ 220. 00/pcPhp 220. 00 9. Ballpen (30 pcs/yr @ 8. 00/pc)Php 240. 00 10. Liquid Erasure 1 bot. /yr @38. 00/pcPhp 38. 00 Total: Php 14,513. 00 Electricity (Annual Consumption) No. of CPU 1 No. of Monitor 1 No. of Printer 1 Monitor Type Monochrome Working Days 200 General Charge 3. 95 Hours Used/ Days 6 System Unit Power Consumption/Day (6 hrs/ day * 400 watt) 2,400 watt/day HP Printer power Consumption/day (6 hrs/day * 90 watt) 540 watt/ day Monitor Power Consumption/ day (6 hrs / day * 30 watt) 180 watt / day Watt used for by device per day 2,400+540+180=3,120 wattsWatt used for all device / yr (3,210 * 200) 624,000 watts / yr Kilowatt used / yr (624,000 watts / 1000) 624 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) =3,120 * 200 =624,000 Amount Due = (kilowatt / yr) * Generation Charge =624 *3. 95 Php 2,464. 80 Proposed System Annual Operating Cost B. Supplies 11. Ink (3 tubes/yr @ 1,130/tube)Php 3,390. 00 12. Ribbon Cartridge (2 boxes/yr @ 145. 00/box)Php 290. 00 13. Bond Paper (4 rims (US long)/yr @230. 00/rimPhp 920. 0 (4 rims(US short)/yr @ 225. 00/rimPhp 900. 00 14. Stapler (1 pc/yr @ 145. 00/pcPhp 145. 00 15. Stapler Wire (20 boxes/yr @ 50. 00/box)Php 1,000. 00 16. Folder (22 pcs/yr @ 8. 00/pc)Php 176. 00 17. Fastener (12 boxes/yr @ 150. 00/boxPhp 1, 800. 00 18. Puncher (1 pcs/yr @ 220. 00/pcPhp 220. 00 19. Ballpen (18 pcs/yr @ 8. 00/pc)Php 144. 00 20. Liquid Erasure (1 bot. /yr @38. 00/pcPhp 38. 00 Total: Php 9,023. 00 Electricity (Annual Consumption) No. of CPU 1 No. of Monitor 1 No. of Printer 1 Monitor Type Monochrome Working Days 200 General Charge 3. 95 Hours Used/Days 8System Unit Power Consumption/Day (8 hrs/ day * 400 watt) 3,200 watt/day HP Printer power Consumption/day (8 hrs /day * 90 watt) 720 watt/ day Monitor Power Consumption/ day (8 hrs / day * 30 watt) 240 watt / day Watt used for by device per day 3,200+720+240=4,160 watts Watt used for all device / yr (4,160 * 200) 832,000 watts / yr Kilowatt used / yr (832,000 watts / 1000) 832 kilowatts / yr Watt / yr = (watt / day) * (working days / yr) 4,160 * 200 =832,000 Amount Due = (kilowatt / yr) * Generation Charge =832 *3. 95 Php 3,286. 40 Annual Benefit Present System Annual Operating Cost = Php 14,513. 00 Less Proposed Annual Operating Cost = Php 9,023 Annual Sav ings: Php 5,490. 00 Table of Annual Net Benefit Year| Annual saving| (1+i)n| Present value| Cumulative Value| 1| 5,490. 00 | 1. 024| 5621. 76| 5621. 76| 2| 5,490. 00 | 1. 049| 5759. 01| 11518. 02| 3| 5,490. 00 | 1. 74| 5896. 26| 17688. 78| 4| 5,490. 00 | 1. 100| 6039. 00| 24156. 00| 5| 5,490. 00 | 1. 126| 6181. 74| 30908. 07| This Table shows the table of annual net benefit. Project in percentage from 1-5 the cash flow. This table shows that Present value are computed by getting the product of annual saving and (1+i)n while the cumulative value is computed by getting the sum of the present value of that particular year and the cumulative value of the previous year. Where I = interest rate n = no. of years 3% = interest rate Payback Period 2+ Proposed System Annual Operating Cost- Cumulative Value in 3 Years Present Value in 3 Years The Cost and Benefits Analysis given above will help the Finance officer to decide whether to implement a computerized Land Patent Form System. It shows that the total annual operating cost of the present system is Php 14,513. 00; the researcher’s analysis reveals that the proposed system is lower operating cost, lower supplies expenses, less physical space needed, fewer operators required, faster turnaround time, greater accuracy, more comprehensive reports and improves morale-financial benefits school pegs at Php 5,490. 0 annually. Base on the cost-benefits estimates, the office would see a return on each investment in 2 years and seven months. In this case, it is very clear that the expected benefits of the proposed system do exceed the expected cost. G. Hardware and Software Hardware and software requirements are very essential in the automation of the system and they are the component in the system analysis. In choosing hardware factors to be considered include the following ability, affordability, speed and robustness of the hardware to save time and energy. H. Hardware and Software ConfigurationHardware Configuration C omputer: Personal Computer with Pentium (R) or higher processor Memory: 512MB of Random Access Memory or Higher Display: 32bit (1024 x 768 pixels) Monitor: video Graphics Accelerator (VGA) or Higher : Resolution monitor (Super VGA recommended) Hard Dick Requirements: At least 700MB of free space Video Display Adapter: 64MB (Any branded video card) Key board Features: Standard 101/102-Key or Microsoft PS/2 keyboard Mouse: Microsoft mouse compatible pointing device Power Supply: AVR (Automatic Voltage Regulator) 500watts & 220volts outlet UPS (Uninterrupted power Supply) 300watts & 220volts outlet Printer: EPSON LQ300+2 (dot matrix printer) : MP1600Le (photocopier/printer/scanner) Software Configuration Operating System: Microsoft windows 2009 Dark edition, Windows 98, Windows XP, SP2, SP3, Windows 2000 Application Software: MS Office Programming Language: Visual Basic I. Essential Model The essential model is a modeling tool shows what the system must do in order to satisfy t he user’s requirements on how the system is implemented. It consist of two major components namely the environmental model and behavioral model. I. 1. Environmental modelThe environmental model is modeling tool that defines the boundary and the interaction between the system and the environment. It consists of the statement of the purpose event list and context diagram. I. 1. 1 Statement of Purpose The Manual Crime & Incidents Record System of the PNP Roxas Zamboanga del Norte is use to record update and edits information about Crime and Incidents such as Car crash, Robbery etc. and surveying of records. It is also used to generate reports such as Spot Report. I. 1. 2. Event List The event list is a narrative list of all activities that occur in the environment to which the system responses.It has seven events namely: 1. PNP Head request Spot Report 2. Responder Submitted Spot Report 3. Provincial Police Office Request Report 4. Provincial Police Requires Report 5. Region al Police Office request Report 6. PNP Roxas submits the spot report Responder PNP Head Spot Report Spot Report Manual Crime and Incidents Record Keeping System Note Spot Report Master list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Provincial Office Regional Office Figure 4. The Context Diagram that shows the Automated Crime and incident’s Record Keeping System.The figure shows the different external entities in which the system responses. The Responder, PNP head, Provincial Police Office, Regional Police Office are the persons involve in the processing of the Crimes and Incidents record system or information and in generation of reports. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the coll ection of data. Responder Spot Report Spot Report Spot Report File Spot Report ProcessRequest Figure 5. Event List 1: PNP Head Request Spot Report This figure shows that when the PNP Head requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Responder Process of the Spot Report Note Spot Report Master list of crimes and incidentsFigure 6. Event List 2: PNP Head Request Spot Report This figure shows that when the PNP Head requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Terminal – the exter nal entities of the individual or group of people. Legend: Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Provincial Police HeadquartersMaster list of crimes and incidents Master list of crimes and incidents Master list of crimes and incidents Spot Report File Process Request Figure 7. Event List 3: Provincial Police Headquarter request Master List This figure shows that when an PNP Head submit’s the Spot Report and Master List file to the Provincial Police Office. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Process RequestSpot Report PNP Head PNP Head submit’s the Spot Report Provincial Police Office Figure 8. Eve nt List 4: PNP Head submit’s Spot Report This figure shows that when an PNP Head submit’s the Master List file to the Provincial Police Office. Legend: Terminal – the external entities of the individual or group of people. Process – it represent various individual functions that system carries out. Flows – the connection between processes. Data Store – store the collection of data. Master list of crimes and incidents Regional Police Headquarters Master list of crimes and incidents Spot Report FileMaster list of crimes and incidents Process Request Figure 9. Event List 5: Regional Police Headquarter request Master List This figure shows that when the Regional Police Office requires a report, the Spot Report File and Master List of Crimes and Incidents File were retrieved to print the Spot Report and Master List of Crimes and Incidents Legend: Terminal – the external entities of the individual or group of people. Process – it rep resent various individual functions that system carries out. Flows – the connection between processes. Data Store – store the collection of data. Process RequestPNP Head Spot Report PNP Head submit’s the Spot Report Regional Police Office Figure 10. Event List 6: PNP Head submit’s Spot Report This figure shows that when an PNP Head submit’s the Master List file to the Regional Police Office. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. 1. 2 Behavioral Model This model is primary concern on the internal behavior of the system to interest with the environment.This model includes Data Flow diagram, Process specifications and Data dictionary. The behavioral model includes the following: 1. 2. 1 Data flow diagram (DFD) –are us ed to describe how the system transforms information. They define how information processed and stored and identify how the information flows through the processes. 1. 2. 2 Data dictionary – specify relationship between each of said user application. Program and said sets of data stored in said database associated with each of said user application programs. 1. 2. 3 Process Specifications – a step by step flow of transaction on each process.Top Level Data Flow Diagram 1. Process Submission of Spot Report 2. Process Request Spot Report File Spot Report Spot Report Master list of crimes and incidents Spot Report File Spot Report Master list of crimes and incidents Figure 11. This figure shows entire flow of the data through the system. It implies how the transaction is processed and described how the different process involved. Data Store – store the collection of data. Flows – the connection between processes. Process – it represent various individu al functions that system carries out. Terminal – the external entities of the individual or group of people.Legend: 1. Process Submission of Spot Report Spot Report Spot Report File Spot Report Figure 12 Process Submission of Spot Report This figure shows that during the process of Submission of Spot Report. Legend: Terminal – the external entities of the individual or group of people. Flows – the connection between processes. Process – it represent various individual functions that system carries out. Data Store – store the collection of data. Spot Report Master list of crimes and incidents 2. Process Request Master list of crimes and incidents Spot Report Spot Report File Figure 13Process Request This figure shows that during the Process of Request and Release of Spot Report and Master List File of Crime and Incidents. Legend: Terminal – the external entities of the individual or group of people. Data Store – store the collection of data. Process – it represent various individual functions that system carries out. Flows – the connection between processes. J. 2. Data Dictionary Alphanumeric=* either number or letter or combination of both* Address=*address of the person where involve in an incidents or crime Character=*a letter, number and special character*sContact No. =*Contact No. of Person Involve [email  protected]{numeric} Date =*(mm/dd/yy)* [email  protected]{numeric} Name =Name of person [email  protected]{character} Numeric =*a number (0-9)* Request information =*an information of a particular crime or incidents* [email  protected]{alphanumeric} Record =*It refers to all the information of the requested item which is being inputted by Responder* [email  protected]{alphanumeric} Record File =*refers to the file in which all the record information about the Crime and Incidents is stored. This file is also used during retrieval of information* @{alphanumeric} Spot Report =*refers t o the file in which all the record information about the Crimes and Incidents is stored. This file is also used during retrieval of information* [email  protected]{alphanumeric} ={Full name}+{age}+{address}+{sex}+{time}+{date}+{place}+{evidence}+{Materials}+{summary of the incidents} J. 3 Process Specification Process 1: Submission of Spot Report Begin Open Spot Report File If Close Close Spot Report File End If End Process 2: Process Request Begin Open Spot Report File If Close Close Spot Report File End If End

Thursday, January 2, 2020

The Role Of Traditional Household Gender Roles - 1710 Words

â€Å"Gender relations are not confined to the domestic arena — although households constitute an important institutional site on which gender relations are played out — but are made, remade and contested in a range of institutional arenas†(Changing Gender Relations In The Household). In parallel to this statement, women and men have always had their own perceive norm within the household. Women are traditionally homemakers and men assume the sole status of breadwinner. However, in modern day society men are becoming more open to the idea of gender equality in regards to family roles. Mothers and society are socializing individuals with this norm. Currently, there is a gradual transition from a male dominant society to gender equality. This paper will look at the impact of traditional household gender roles by analyzing the following questions: 1. Why is there a gender shift in household gender roles? 2. What is the impact of balancing work and a family? 3. What are the benefits for the family? 4. Is gender equality within a family positively affecting society? By understanding how this change has come about, predictions can be made to determine how this will impact the future, to see if this will change situations outside of the home that are gender sensitive, and to see if this will give a people a broader perspective to work with. Why is there a gender shift in household gender roles? Influenced by the ever changing society, the household gender roles are transforming. Due anShow MoreRelatedTraditional Gender Roles During The United States835 Words   |  4 Pagesand Sarah (1998) examined traditional gender roles among men and women in the United States as well as in Mexico. The study revealed distinct differences between traditional gender roles perceptions held by Americans and Mexicans. The authors state that family settings in Mexico have been characterized by a dominance of the husband. The women are expected to make sacrifices for the sake of their families. They engage in household chores while the men are tasked with the role of providing income to theRead MoreGender Assignment : Child Is Born With The Sonogram908 Words   |  4 PagesGender assignment begins even before a child is born with the sonogram that tells the parents if they are having a little boy or a little girl. It happens again the moment a child is born with the phrase â€Å"It’s a boy!† or â€Å"It’s a girl!† announced over the wailing newborn in the delivery room. Initially we use biology to determine whether a child is male or female. From that day on, they are continually influenced by the adults around them. At the hospital, the baby is given a hat to keep its headRead MoreParental Influence On Gender Roles1179 Words   |  5 PagesEnglish 120 – Fall 2017 October 8, 2017 Parental Influence on Gender Roles in Children A person s gender identity is a multi-faceted social construct that is defined as a person s sense of being male or female in various combinations; gender roles are then defined as behaviors learned by a person as appropriate to their gender, determined by the prevailing cultural norms. From the moment of birth when a parent hears their baby s gender an identity has begun to form. When we meet a new person, weRead MoreReflections on the Gender Wage Gap Essay1123 Words   |  5 PagesThe gender wage gap is a complicated issue that has persisted despite the Equal Pay Act of 1963 that promised equal pay for equal work. According to the U.S. Bureau of Labor Statistics, in 2010, women on average earned 81 cents for every dollar men earned, creating concern among scholars, policy makers, and the press, and lingering questions as to cause (2011). While the wage gap has narrowed considerably in the nearly 50 years since the passage of the Equal Pay Act of 1963, many contend that theRead MoreHow The Housework Is Divided Among Men And Women970 Words   |  4 PagesLoi 1 Ryan Loi Professor Clarkson ENG1100 October 9, 2015 A Generation of Housework When it comes to managing a household, household chores are important tasks that must be done. To avoid doing these chores would be neglecting the home and therefore, would create an unpleasan t atmosphere to live in. Every person who lives in the household must contribute and fulfill their responsibility to ensure that their house is as well maintained as possible. What is interesting though is how theRead MoreKorean Culture And Gender Roles990 Words   |  4 PagesIn South Korean culture family, gender roles, and customs all intertwine, in a traditional Korean family your role in the family is determined by gender and age. However, in recent years it seems like the traditional family dynamics and gender roles are being redefined by the newer generations. South Korean families are leaving behind the traditional family practices, gender roles inside the Korean culture are traditional male and female roles, and lastly customs are hugely influenced by ConfucianismRead MoreThe Fundamental Agents Of Socialization976 Words   |  4 Pagesof the most fundamental agents of socialization, the social construct of traditional families had continued to be molded and transformed by events in history. Most families in the United States no longer thrive within the traditional boundaries and guidelines set by our forefathers. At first, families within the United States consisted of a father, a mother and a few children; however, due to historical events, traditional families shifted to include same-sex couples, single parents, and fewer childrenRead MoreGender Roles in Vietnam761 Words   |  4 PagesChange, continuity and gender roles in Vietnam In detail, discuss how the gender roles of women and men in Vietnam have changed and continued over time and the causes of these changes. In addition outline how these changing gender roles have affected the status of both men and women in Vietnam. Vietnam is a country where gender roles are undergoing vast changes, especially the women’s status in the public spheres, which includes their educational attainment, earnings, occupational status, jobRead MoreGender Roles in Christine Ebers Women and Alcohol in a Highland Mayan Town529 Words   |  3 PagesGender Roles in Christine Ebers Women and Alcohol in a Highland Mayan Town It is apparent from Christine Ebers research in her work, Women and Alcohol in a Highland Maya Town, that the gender roles and relations for men and women in the town of Chenalho have gone through somewhat dramatic changes since the 1960s and 1970s. They have gone from clearly defined roles for both men and women, to a more skewed framework that allows for a great deal of gray area. These roles have not only changedRead MoreChildhood Under The Industrial Capitalism System Essay915 Words   |  4 Pagesthree themes: Sociology of family, Gender Studies, and Division of labor. The Sociology of Family is intend to examine family as a unit of socialization, in which it regards to different sociological perspectives, like the nuclear family, gender role, and concepts about childhood under the Industrial Capitalism system. To better analyze the result in relating to this sociological study, it is easier to explain the data under the following sub-titles: Changing roles of family members This section